[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 25 Jun 2020 19:01:28 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/06/25 19:01:27
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.es.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.506&r2=1.507
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.602&r2=1.603
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.357&r2=1.358
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.412&r2=1.413
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.186&r2=1.187
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- de.po 24 Jun 2020 05:37:08 -0000 1.186
+++ de.po 25 Jun 2020 23:01:25 -0000 1.187
@@ -2592,6 +2592,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- es.po 24 Jun 2020 09:29:40 -0000 1.268
+++ es.po 25 Jun 2020 23:01:25 -0000 1.269
@@ -2418,6 +2418,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- fr.po 24 Jun 2020 05:37:09 -0000 1.326
+++ fr.po 25 Jun 2020 23:01:25 -0000 1.327
@@ -2128,6 +2128,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- it.po 24 Jun 2020 05:37:09 -0000 1.186
+++ it.po 25 Jun 2020 23:01:25 -0000 1.187
@@ -2528,6 +2528,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- ja.po 24 Jun 2020 05:37:09 -0000 1.194
+++ ja.po 25 Jun 2020 23:01:25 -0000 1.195
@@ -1936,6 +1936,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-appliances.de-diff.html 24 Jun 2020 05:37:09 -0000 1.57
+++ malware-appliances.de-diff.html 25 Jun 2020 23:01:26 -0000 1.58
@@ -98,33 +98,41 @@
</li>
<li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or
two</em></ins></span>
-to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions</em></ins></span> of
<span class="inserted"><ins><em>products in</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
+ <li id="M202006250">
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second</em></ins></span> of <span
class="inserted"><ins><em>what</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
</li>
<li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>a surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span> <span
class="inserted"><ins><em>watching</a>. This</em></ins></span> is <span
class="removed"><del><strong>an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>illegal due to</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer, based
on</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
+ <li id="M202006160">
+ <p><a
+
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
+ A disasterous security bug</a> touches millions of products
in</em></ins></span> the <span class="removed"><del><strong>fact
+ that</strong></del></span>
<span class="inserted"><ins><em>Internet of Stings.</p>
- <p>As</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>result, anyone can sting</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>user, not only</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span>
- <span class="inserted"><ins><em>manufacturer.</p>
+ <p>As a result, anyone can sting</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>user, not only the
+ manufacturer.</p>
</li>
<li id="M202005070">
- <p>Wink sells a “smart” home hub</em></ins></span> that
<span class="removed"><del><strong>the device</strong></del></span> is tethered
+ <p>Wink sells a “smart” home hub that</em></ins></span>
is tethered
to a <span class="removed"><del><strong>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
<p>But</strong></del></span> <span class="inserted"><ins><em>server.
In May 2020,</em></ins></span> it <span class="removed"><del><strong>also
demonstrates</strong></del></span> <span class="inserted"><ins><em>ordered the
purchasers to start <a
@@ -136,19 +144,20 @@
<li>
<p>A “smart” intravenous pump designed for
- hospitals</strong></del></span> <span
class="inserted"><ins><em>hub</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>useless without that.</p>
+ hospitals</strong></del></span> <span
class="inserted"><ins><em>hub</em></ins></span> is <span
class="removed"><del><strong>connected to the internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its</strong></del></span> <span class="inserted"><ins><em>useless without
that.</p>
</li>
<li id="M201912170">
- <p>Some security breakers (wrongly referred in this article as <a
-
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed</em></ins></span> to <span
class="inserted"><ins><em>interfere</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally</strong></del></span> <span
class="inserted"><ins><em>Amazon Ring proprietary system, and</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access</em></ins></span>
- its <span class="removed"><del><strong>security has been
cracked</a>.</p>
- <p>Note that this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p></strong></del></span> <span
class="inserted"><ins><em>camera, speakers and
microphones</a>.</p></em></ins></span>
+ <p>Some</em></ins></span> security <span
class="removed"><del><strong>has been cracked</a>.</p>
+ <p>Note that</strong></del></span> <span
class="inserted"><ins><em>breakers (wrongly referred in</em></ins></span> this
article <span class="removed"><del><strong>misuses the
term</strong></del></span> <span class="inserted"><ins><em>as</em></ins></span>
<a
+<span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
+ managed</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span> <span
class="inserted"><ins><em>interfere the Amazon Ring proprietary system, and
<a
+
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
+ its camera, speakers and microphones</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -192,9 +201,9 @@
<p>Best Buy made controllable appliances and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>.
-Specifically, the app would record the names of</strong></del></span>
+Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down</em></ins></span> the <span class="removed"><del><strong>audio
files
+ shut down</em></ins></span> the <span class="removed"><del><strong>app
would record the names of the audio files
users listen</strong></del></span> <span
class="inserted"><ins><em>service</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
</p>
@@ -214,99 +223,98 @@
<li <span class="removed"><del><strong>id="anova">
<p>Anova sabotaged users' cooking devices with a downgrade
that</strong></del></span> <span class="inserted"><ins><em>id="M201904260">
- <p>The Jibo robot toys were</em></ins></span> tethered <span
class="removed"><del><strong>them</strong></del></span> to <span
class="removed"><del><strong>a remote server.</strong></del></span> <span
class="inserted"><ins><em>the manufacturer's server,
- and</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
- cookers won't function.</a></p>
-</li>
-
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"></em></ins></span>
- the <span class="removed"><del><strong>Internet,
-its security is crap</a>.</p>
-<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>company made them all cease</em></ins></span> to
<span class="inserted"><ins><em>work</a> by shutting down that
+ <p>The Jibo robot toys were</em></ins></span> tethered <span
class="removed"><del><strong>them</strong></del></span> to <span
class="inserted"><ins><em>the manufacturer's server,
+ and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ the company made them all cease to work</a> by shutting down that
server.</p>
- <p>The shutdown might ironically be good for their users,
since</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
- infect it with malware, and force the dishwasher</strong></del></span>
- <span class="inserted"><ins><em>product was designed</em></ins></span> to
<span class="removed"><del><strong>launch attacks</strong></del></span> <span
class="inserted"><ins><em>manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying</em></ins></span> on
- <span class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ <p>The shutdown might ironically be good for their users, since the
+ product was designed to manipulate people by presenting</em></ins></span>
a <span class="removed"><del><strong>remote server.</strong></del></span> <span
class="inserted"><ins><em>phony
+ semblance of emotions, and was most certainly spying on them.</p>
</li>
<li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ <p>The Medtronics Conexus Telemetry Protocol has</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
- defibrillators</a> and the</em></ins></span> devices <span
class="inserted"><ins><em>they connect to.</p>
+ defibrillators</a> and the devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol</em></ins></span> in <span class="inserted"><ins><em>2008.
Apparently, nothing was done by</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are
used</strong></del></span> <span class="inserted"><ins><em>company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs</em></ins></span> in <span
class="removed"><del><strong>hospitals,
- such attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>their
products.</p></em></ins></span>
+ vulnerabilities were discovered in</em></ins></span> an <span
class="removed"><del><strong>account</strong></del></span> <span
class="inserted"><ins><em>earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely</em></ins></span> on <span
class="removed"><del><strong>Anova's servers,</strong></del></span> <span
class="inserted"><ins><em>proprietary software
+ developers to fix bugs in</em></ins></span> their
+ <span class="removed"><del><strong>cookers won't
function.</a></p></strong></del></span> <span
class="inserted"><ins><em>products.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners</strong></del></span>
+<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span>
<span class="inserted"><ins><em><li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon)</em></ins></span> can <span
class="removed"><del><strong>still remotely control it</a>.</p>
-</li>
-<li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span> <span
class="inserted"><ins><em>watch all the time. Now it turns out</em></ins></span>
- that <span class="inserted"><ins><em><a
+ <p>The Ring (now Amazon) doorbell camera</em></ins></span> is
+<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>designed so
that</em></ins></span> the <span class="removed"><del><strong>Internet,
+its security is crap</a>.</p>
+<p>For example, a cracker</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now
Amazon)</em></ins></span> can <span class="removed"><del><strong>gain access
to</strong></del></span> <span class="inserted"><ins><em>watch
all</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>time.
Now</em></ins></span> it <span class="removed"><del><strong>with
malware,</strong></del></span> <span class="inserted"><ins><em>turns out
+ that <a
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch, and fake videos too</a>.</p>
+ anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong>force the dishwasher</strong></del></span> <span
class="inserted"><ins><em>fake videos too</a>.</p>
- <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>viewed on them,</strong></del></span> <span
class="inserted"><ins><em>presumably
- unintentional</em></ins></span> and <span class="inserted"><ins><em>Amazon
will probably fix it. However, we
- do</em></ins></span> not <span class="removed"><del><strong>just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>expect Amazon to change</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>design that <a
- href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p>
+ <p>The third party vulnerability is presumably
+ unintentional and Amazon will probably fix it. However, we
+ do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds of lives at risk.</p>
+
+</li>
+<li>
+<p>If you buy a used “smart” car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span> <span class="inserted"><ins><em>design
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely control
it</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>Vizio
+ “smart”</strong></del></span>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the
user</em></ins></span> is <span class="removed"><del><strong>coming
from</strong></del></span> <span class="inserted"><ins><em>still
+ <span class="inserted"><ins><em><li id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>constantly
+ communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
paid for.</p>
<p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>a way to
- disable</strong></del></span> <span class="inserted"><ins><em>ink
cartridges that would otherwise be in
- working order.</p>
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence of a way to
+ disable</strong></del></span> <span class="inserted"><ins><em>spies on
users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it
was</strong></del></span> <span class="inserted"><ins><em>use of ink cartridges
that would otherwise be</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does not legitimize the
surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>working order.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+<p>More or less all “smart” TVs</strong></del></span>
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if</strong></del></span> <span
class="inserted"><ins><em>video they capture to Amazon servers</a>, which
save</em></ins></span> it <span class="removed"><del><strong>were not hidden as
it was in
- these TVs, does not legitimize</strong></del></span>
- <span class="inserted"><ins><em>long-term.</p>
-
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
-</li>
-<li>
-<p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <span class="inserted"><ins><em><li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
better.</p>
-<p>This</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> shows <span
class="inserted"><ins><em>everyone</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+<p>This</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video</em></ins></span> shows <span
class="inserted"><ins><em>everyone</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
consent before collecting personal data are totally inadequate. And
what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>comes near, or merely
passes by,</em></ins></span> the <span class="removed"><del><strong>TV
will say,
@@ -429,24 +437,24 @@
</li>
<span class="removed"><del><strong><li>
-<p>The</strong></del></span>
+<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials. It is</strong></del></span>
<span class="inserted"><ins><em><li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was designed with DRM</a>: it won't accept
-third-party printing materials. It is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>Keurig</strong></del></span> <span
class="inserted"><ins><em>risk</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span> <span
class="inserted"><ins><em>an outage (which</em></ins></span> is
-<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't
-be available and</strong></del></span> <span class="inserted"><ins><em>what
- just happened).</p>
+ only through</em></ins></span> the <span
class="removed"><del><strong>Keurig</strong></del></span> <span
class="inserted"><ins><em>company's server. They have
+ all the nasty characteristics</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
+being discontinued, which means that eventually authorized materials won't
+be available</strong></del></span> <span class="inserted"><ins><em>such
devices: <a
+
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance,</em></ins></span> and <span class="removed"><del><strong>the
printers may become unusable.</p>
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+<p>With</strong></del></span> <span class="inserted"><ins><em>danger of
sabotage</a> (of</em></ins></span> a <span
class="inserted"><ins><em>specific user, or of
+ all users at once), as well as the risk of an outage (which is what
+ just happened).</p>
-<p>With a</strong></del></span> <span class="inserted"><ins><em>desired
temperature requires running
+ <p>In addition, setting the desired temperature requires running
nonfree software. With an old-fashioned thermostat, you can do it
using controls right on the thermostat.</p>
</li>
@@ -526,16 +534,15 @@
<span class="removed"><del><strong><li>
<p><a
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers to be suckers</em></ins></span>
and <span class="removed"><del><strong>Bluray disks have DRM</a>.
+DVDs and Bluray disks have DRM</a>.
</p>
<p>That page uses spin terms that favor DRM,
-including</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
+including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers</em></ins></span>
and <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
and it claims that “artists” (rather than companies) are
primarily responsible for putting digital restrictions management into
these disks. Nonetheless, it is a reference for</strong></del></span>
@@ -587,151 +594,117 @@
the <span class="removed"><del><strong>fault of app developers. That is
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> the <span class="removed"><del><strong>apps are
proprietary software.</p>
<p>Anything whose name is “Smart”</strong></del></span>
<span class="inserted"><ins><em>device</em></ins></span> is <span
class="removed"><del><strong>most likely going</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to
-<span class="removed"><del><strong>screw you.</p>
-</li>
-
-<li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
-
-<p>A camera</strong></del></span> <span class="inserted"><ins><em>a
server.</p>
+<span class="removed"><del><strong>screw you.</p></strong></del></span>
<span class="inserted"><ins><em>a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates</em></ins></span> that <span
class="removed"><del><strong>records locally on physical media, and has no
network
-connection, does not threaten people with surveillance—neither
-by watching people through</strong></del></span> the <span
class="removed"><del><strong>camera, nor through malware
in</strong></del></span> <span class="inserted"><ins><em>device
gives</em></ins></span> the
-<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>company
+ <p>But it also demonstrates that the device gives the company
surveillance capability.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently
-spread</strong></del></span>
+<p>
+Malware found on</strong></del></span>
<span class="inserted"><ins><em><li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals is connected</em></ins></span> to <span
class="removed"><del><strong>computers and other FitBit trackers that interact
with
-them.</p>
-</li>
-
-<li>
-<p> “Self-encrypting” disk drives do</strong></del></span>
the <span class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it. Western
Digital's</strong></del></span> <span class="inserted"><ins><em>internet.
Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back door</a>.</p>
-</li>
-
-<li>
-<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>” by
a</strong></del></span>
+ designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its</em></ins></span> security
-<span class="removed"><del><strong>researcher.</p>
+ its</em></ins></span> security <span class="removed"><del><strong>cameras
available through Amazon</a>.
+</p>
-<p>Depending on what drug is being infused, the insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>has been
cracked</a>.</p>
+<p>A camera</strong></del></span> <span class="inserted"><ins><em>has
been cracked</a>.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>term <a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>records locally</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span
class="removed"><del><strong>murder.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.)</small></p></em></ins></span>
+ referring to crackers.)</small></p>
</li>
-<span class="removed"><del><strong><li>
-<p>Due to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280">
- <p>The</em></ins></span> bad security in <span
class="removed"><del><strong>a drug pump, crackers could use
it</strong></del></span> <span class="inserted"><ins><em>many Internet of
Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="inserted"><ins><em>snoop on the people that use
them</a>.</p>
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on <span class="removed"><del><strong>physical
media, and has no network
+connection, does not threaten people with surveillance—neither
+by watching</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> people <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>that use them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>camera, nor through malware
in</strong></del></span> <span class="inserted"><ins><em>stings.</p>
- <p><small>(It is unfortunate that the article uses the
term</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that</em></ins></span> the
+<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out</strong></del></span>
+<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201708230">
- <p>Sonos <a
-
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ <p>Sonos</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
+attackers to send malware</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”</em></ins></span>
- to <span class="inserted"><ins><em>snooping or the product will stop
working</a>. <a
+ to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>devices, which can subsequently
+spread</strong></del></span> <span class="inserted"><ins><em>product will stop
working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another article</a> says they won't forcibly change the software, but
- people won't</em></ins></span> be <span
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to
-<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>get any upgrades and eventually it will
- stop working.</p></em></ins></span>
+ people won't be able</em></ins></span> to <span
class="removed"><del><strong>computers</strong></del></span> <span
class="inserted"><ins><em>get any upgrades</em></ins></span> and <span
class="inserted"><ins><em>eventually it will
+ stop working.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The <a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>company for making webcams with bad
security</a> so
-that it was easy for anyone</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>watch them.</p>
-</li>
-
-<li>
-<p>It</strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI</em></ins></span> is <span
class="removed"><del><strong>possible to <a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill people by taking control of medical implants by radio</a>. More
-information</strong></del></span> in <span class="inserted"><ins><em>many
cases</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on</em></ins></span> other <span
class="removed"><del><strong>FitBit trackers that interact with
+them.</p></strong></del></span> <span class="inserted"><ins><em>people,
DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Lots</strong></del></span>
+<p> “Self-encrypting” disk drives do the
encryption</strong></del></span>
<span class="inserted"><ins><em><li id="M201706200">
- <p>Many models</em></ins></span> of <span
class="removed"><del><strong><a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>,</strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras
+ <p>Many models of Internet-connected cameras
are tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be changed, and <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+ accounts</em></ins></span> with
+<span class="removed"><del><strong>proprietary firmware so
you</strong></del></span> <span class="inserted"><ins><em>hard-coded passwords,
which</em></ins></span> can't <span class="removed"><del><strong>trust it.
Western Digital's</strong></del></span> <span class="inserted"><ins><em>be
changed, and</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+“My Passport” drives have a back
door</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts
either</a>.</p></em></ins></span>
</li>
- <li id="M201705250">
+<span class="removed"><del><strong><li>
+<p>
+Hospira infusion</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices is <a
+ insulin</em></ins></span> pumps, <span class="removed"><del><strong>which
are used to administer drugs to
+a patient,</strong></del></span> <span class="inserted"><ins><em>and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
<li id="M201705180">
- <p>Bird and rabbit pets were implemented for Second
- Life by a company that tethered their food to a server. <a
+ <p>Bird and rabbit pets</em></ins></span> were <span
class="removed"><del><strong>rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>”</strong></del></span>
<span class="inserted"><ins><em>implemented for Second
+ Life</em></ins></span> by a <span class="removed"><del><strong>security
+researcher.</p>
+
+<p>Depending on what drug is being infused,</strong></del></span> <span
class="inserted"><ins><em>company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down the server and the pets more or less died</a>.</p>
+ It shut down</em></ins></span> the <span
class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>server
and</em></ins></span> the <span class="removed"><del><strong>door to
murder.</p></strong></del></span> <span class="inserted"><ins><em>pets
more or less died</a>.</p></em></ins></span>
</li>
- <li id="M201704190">
+<span class="removed"><del><strong><li>
+<p>Due to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704190">
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
@@ -1015,11 +988,11 @@
<p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</em></ins></span> and
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having</em></ins></span> it
<span class="inserted"><ins><em>enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
@@ -1028,7 +1001,7 @@
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo</em></ins></span>
can <span class="removed"><del><strong>be
fatal.</p></strong></del></span> <span class="inserted"><ins><em>now <a
+ information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
@@ -1057,15 +1030,45 @@
</li>
<li id="M201506080">
- <p>Due to bad security in a drug pump, crackers could use it to <a
+ <p>Due to</em></ins></span> bad security in a drug pump, crackers
could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished a company for making webcams with bad security</a> so
+that it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs</em></ins></span> people <span
class="removed"><del><strong>by taking control of medical implants by
radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
+<a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p>
+</li>
+
+<li>
+<p>Lots of <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>, and it can be
fatal.</p></strong></del></span> <span class="inserted"><ins><em>watch,
and even what they wanted to
record</a>.</p></em></ins></span>
</li>
@@ -1441,7 +1444,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:09 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-appliances.de.po 24 Jun 2020 05:37:09 -0000 1.91
+++ malware-appliances.de.po 25 Jun 2020 23:01:26 -0000 1.92
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-appliances.es.po 24 Jun 2020 09:20:54 -0000 1.26
+++ malware-appliances.es.po 25 Jun 2020 23:01:26 -0000 1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-24 10:58+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -95,6 +96,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- malware-appliances.fr.po 24 Jun 2020 05:02:40 -0000 1.153
+++ malware-appliances.fr.po 25 Jun 2020 23:01:26 -0000 1.154
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-22 11:38+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -91,6 +92,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-appliances.pot 24 Jun 2020 05:37:09 -0000 1.76
+++ malware-appliances.pot 25 Jun 2020 23:01:26 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\">snoop
"
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a "
"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">
"
"A disasterous security bug</a> touches millions of products in the Internet "
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- malware-appliances.ru.po 24 Jun 2020 05:04:03 -0000 1.191
+++ malware-appliances.ru.po 25 Jun 2020 23:01:26 -0000 1.192
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -93,6 +94,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- nl.po 24 Jun 2020 05:37:10 -0000 1.187
+++ nl.po 25 Jun 2020 23:01:26 -0000 1.188
@@ -2085,6 +2085,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- pl.po 24 Jun 2020 05:37:10 -0000 1.186
+++ pl.po 25 Jun 2020 23:01:26 -0000 1.187
@@ -1657,6 +1657,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- pot 24 Jun 2020 05:37:10 -0000 1.185
+++ pot 25 Jun 2020 23:01:26 -0000 1.186
@@ -1459,6 +1459,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-surveillance.de-diff.html 24 Jun 2020 05:37:12 -0000
1.113
+++ proprietary-surveillance.de-diff.html 25 Jun 2020 23:01:26 -0000
1.114
@@ -2269,6 +2269,14 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
@@ -3726,7 +3734,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary-surveillance.de.po 24 Jun 2020 05:37:12 -0000 1.328
+++ proprietary-surveillance.de.po 25 Jun 2020 23:01:26 -0000 1.329
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3723,6 +3723,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-surveillance.es.po 24 Jun 2020 05:37:12 -0000 1.42
+++ proprietary-surveillance.es.po 25 Jun 2020 23:01:26 -0000 1.43
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-02 22:31-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2\n"
@@ -3199,6 +3200,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.506
retrieving revision 1.507
diff -u -b -r1.506 -r1.507
--- proprietary-surveillance.fr.po 24 Jun 2020 05:37:12 -0000 1.506
+++ proprietary-surveillance.fr.po 25 Jun 2020 23:01:26 -0000 1.507
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-01 13:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3195,6 +3196,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.it-diff.html 24 Jun 2020 05:37:12 -0000
1.179
+++ proprietary-surveillance.it-diff.html 25 Jun 2020 23:01:26 -0000
1.180
@@ -2363,6 +2363,14 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
@@ -3514,7 +3522,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary-surveillance.it.po 24 Jun 2020 05:37:12 -0000 1.340
+++ proprietary-surveillance.it.po 25 Jun 2020 23:01:26 -0000 1.341
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3489,6 +3489,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary-surveillance.ja-diff.html 24 Jun 2020 05:37:12 -0000
1.196
+++ proprietary-surveillance.ja-diff.html 25 Jun 2020 23:01:26 -0000
1.197
@@ -2330,6 +2330,14 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
@@ -3363,7 +3371,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.ja.po 24 Jun 2020 05:37:13 -0000 1.322
+++ proprietary-surveillance.ja.po 25 Jun 2020 23:01:26 -0000 1.323
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2720,6 +2720,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary-surveillance.pot 24 Jun 2020 05:37:13 -0000 1.261
+++ proprietary-surveillance.pot 25 Jun 2020 23:01:26 -0000 1.262
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2170,6 +2170,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\">snoop
"
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a "
"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\">
"
"collect “whatever the TV sees,”</a> in the own words of the "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.602
retrieving revision 1.603
diff -u -b -r1.602 -r1.603
--- proprietary-surveillance.ru.po 24 Jun 2020 05:37:13 -0000 1.602
+++ proprietary-surveillance.ru.po 25 Jun 2020 23:01:26 -0000 1.603
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3169,6 +3170,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.de-diff.html 22 Jun 2020 09:02:54 -0000 1.155
+++ proprietary.de-diff.html 25 Jun 2020 23:01:26 -0000 1.156
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -153,11 +153,11 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -212,6 +212,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -254,22 +262,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -332,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:54 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary.de.po 22 Jun 2020 09:02:54 -0000 1.196
+++ proprietary.de.po 25 Jun 2020 23:01:26 -0000 1.197
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -506,29 +514,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary.es.po 24 Jun 2020 09:20:54 -0000 1.276
+++ proprietary.es.po 25 Jun 2020 23:01:26 -0000 1.277
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,6 +313,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -392,42 +401,6 @@
"privativo. En el software libre son los usuarios quienes tienen el control, "
"y no permitirÃan que les hicieran tales cosas."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"Los teléfonos Xiaomi <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">registran muchas "
-"de las acciones del usuario</a>: ejecutar una aplicación, abrir una carpeta,
"
-"visitar un sitio web, escuchar una canción... También envÃan información "
-"identificativa del dispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"Otros programas que no son libres también espÃan. Por ejemplo, Spotify y "
-"otros antiservicios de transmisión en continuo elaboran un dosier de cada "
-"usuario y <a href=\"/malware/proprietary-surveillance."
-"html#M201508210\">exigen que los usuarios se identifiquen para pagar</a>. "
-"¡Vade retro, Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes exculpa de los mismos agravios cuando los culpables no son chinos, "
-"pero nosotros los condenamos sin importar quién los cometa."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +478,40 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Los teléfonos Xiaomi <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">registran muchas de las acciones del usuario</a>: ejecutar una "
+#~ "aplicación, abrir una carpeta, visitar un sitio web, escuchar una "
+#~ "canción... También envÃan información identificativa del dispositivo."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Otros programas que no son libres también espÃan. Por ejemplo, Spotify y
"
+#~ "otros antiservicios de transmisión en continuo elaboran un dosier de cada
"
+#~ "usuario y <a href=\"/malware/proprietary-surveillance."
+#~ "html#M201508210\">exigen que los usuarios se identifiquen para pagar</a>. "
+#~ "¡Vade retro, Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes exculpa de los mismos agravios cuando los culpables no son chinos, "
+#~ "pero nosotros los condenamos sin importar quién los cometa."
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary.fr.po 22 Jun 2020 09:39:40 -0000 1.323
+++ proprietary.fr.po 25 Jun 2020 23:01:26 -0000 1.324
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-22 11:38+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -389,41 +398,6 @@
"logiciel libre est sous le contrôle de ses utilisateurs, et ils ne se "
"laisseraient pas traiter de la sorte."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"Les téléphones Xiaomi <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">rapportent une "
-"grande partie de ce que font les utilisateurs</a>Â : lancer une appli, "
-"regarder un répertoire, aller sur un site web, écouter une chanson. Ils "
-"envoient également les identifiants de l'appareil."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"D'autres programmes non libres sont aussi des espions. Spotify et autres mal-"
-"services constituent un dossier sur chaque utilisateur et <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\">le forcent à s'identifier pour "
-"payer</a>. Dehors, dehors, satané Spotify !"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes excuse ces mêmes fautes quand les coupables ne sont pas chinois, mais
"
-"nous les condamnons quel que soit leur auteur."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -498,6 +472,39 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Les téléphones Xiaomi <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">rapportent une grande partie de ce que font les utilisateurs</a>Â : "
+#~ "lancer une appli, regarder un répertoire, aller sur un site web, écouter
"
+#~ "une chanson. Ils envoient également les identifiants de l'appareil."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "D'autres programmes non libres sont aussi des espions. Spotify et autres "
+#~ "mal-services constituent un dossier sur chaque utilisateur et <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\">le forcent à "
+#~ "s'identifier pour payer</a>. Dehors, dehors, satané Spotify !"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes excuse ces mêmes fautes quand les coupables ne sont pas chinois, "
+#~ "mais nous les condamnons quel que soit leur auteur."
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.it-diff.html 22 Jun 2020 09:02:55 -0000 1.167
+++ proprietary.it-diff.html 25 Jun 2020 23:01:26 -0000 1.168
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -253,22 +261,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.it.po 22 Jun 2020 09:02:55 -0000 1.205
+++ proprietary.it.po 25 Jun 2020 23:01:26 -0000 1.206
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -510,29 +518,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.ja-diff.html 22 Jun 2020 09:02:55 -0000 1.171
+++ proprietary.ja-diff.html 25 Jun 2020 23:01:26 -0000 1.172
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,12 +58,12 @@
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited {
- color: #004caa;
+ #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
+ <span class="inserted"><ins><em>color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -122,27 +122,27 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
</ul>
</div>
<div class="malfunctions">
<ul>
-<li><strong>Type of
malware</strong></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li></em></ins></span>
+<li><strong>Type of
malware</strong></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li></em></ins></span>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -157,15 +157,15 @@
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,6 +209,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -251,22 +259,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary.ja.po 22 Jun 2020 09:02:55 -0000 1.189
+++ proprietary.ja.po 25 Jun 2020 23:01:26 -0000 1.190
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -371,29 +379,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.nl-diff.html 22 Jun 2020 09:02:55 -0000 1.168
+++ proprietary.nl-diff.html 25 Jun 2020 23:01:27 -0000 1.169
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,13 +65,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -253,22 +261,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary.nl.po 22 Jun 2020 09:02:55 -0000 1.179
+++ proprietary.nl.po 25 Jun 2020 23:01:27 -0000 1.180
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -414,29 +422,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.pl-diff.html 22 Jun 2020 09:02:55 -0000 1.185
+++ proprietary.pl-diff.html 25 Jun 2020 23:01:27 -0000 1.186
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As of January, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>January, 2020, the pages in this directory
list around 450
+instances of malicious functionalities (with more than 500 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -155,17 +155,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -209,6 +209,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -251,22 +259,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:55 $
+$Date: 2020/06/25 23:01:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.pl.po 22 Jun 2020 09:02:56 -0000 1.172
+++ proprietary.pl.po 25 Jun 2020 23:01:27 -0000 1.173
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -591,29 +599,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.pot 22 Jun 2020 09:02:56 -0000 1.169
+++ proprietary.pot 25 Jun 2020 23:01:27 -0000 1.170
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a "
+"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\">snoop
"
+"every second of what the user is watching</a>. This is illegal due to the "
+"Video Privacy Protection Act of 1988, but they're circumventing it through "
+"EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a "
"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">
"
"A disasterous security bug</a> touches millions of products in the Internet "
@@ -308,29 +317,6 @@
"such things to them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a "
-"href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report
"
-"many actions the user takes</a>: starting an app, looking at a folder, "
-"visiting a website, listening to a song. They send device identifying "
-"information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a "
-"href=\"/malware/proprietary-surveillance.html#M201508210\"> they make users "
-"identify themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary.pt-br.po 23 Jun 2020 03:00:37 -0000 1.300
+++ proprietary.pt-br.po 25 Jun 2020 23:01:27 -0000 1.301
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-22 23:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -305,6 +306,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -382,42 +391,6 @@
"Esse tipo de falha é possÃvel apenas com software proprietário â o
software "
"livre é controlado por seus usuários que não deixariam essas coisas com
eles."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"Telefones Xiaomi <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">relata muitas "
-"ações que o usuário executa</a>: iniciando um aplicativo, olhando uma
pasta, "
-"visitando um site, ouvindo uma música. Eles também enviam informações de "
-"identificação do dispositivo."
-
-# "out, out, damned.." refere-se à peça de Shakespeare "Macbeth", Ato 5,
Cena 1
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"Outros programas não livres também bisbilhotam. Por exemplo, o Spotify e "
-"outros serviços de streaming fazem um dossiê sobre cada usuário e <a
href=\"/"
-"malware/proprietary-surveillance.html#M201508210\"> eles fazem os usuários "
-"se identificarem para pagar</a>. Sai, sai, Spotify amaldiçoado!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"A Forbes exonera os mesmos erros quando os culpados não são chineses, mas "
-"condenamos isso, não importa quem o faça."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,6 +466,40 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Telefones Xiaomi <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">relata "
+#~ "muitas ações que o usuário executa</a>: iniciando um aplicativo,
olhando "
+#~ "uma pasta, visitando um site, ouvindo uma música. Eles também enviam "
+#~ "informações de identificação do dispositivo."
+
+# "out, out, damned.." refere-se à peça de Shakespeare "Macbeth", Ato 5,
Cena 1
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "Outros programas não livres também bisbilhotam. Por exemplo, o Spotify e
"
+#~ "outros serviços de streaming fazem um dossiê sobre cada usuário e <a
href="
+#~ "\"/malware/proprietary-surveillance.html#M201508210\"> eles fazem os "
+#~ "usuários se identificarem para pagar</a>. Sai, sai, Spotify amaldiçoado!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "A Forbes exonera os mesmos erros quando os culpados não são chineses,
mas "
+#~ "condenamos isso, não importa quem o faça."
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.357
retrieving revision 1.358
diff -u -b -r1.357 -r1.358
--- proprietary.ru.po 22 Jun 2020 09:32:12 -0000 1.357
+++ proprietary.ru.po 25 Jun 2020 23:01:27 -0000 1.358
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -390,42 +399,6 @@
"пÑогÑаммаÑ
— ÑвободнÑе пÑогÑаммÑ
конÑÑолиÑÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑми, а "
"они не позволÑÑ Ð²ÑÑвоÑÑÑÑ Ñ Ñобой Ñакое."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"ТелеÑÐ¾Ð½Ñ Xiaomi <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">докладÑваÑÑ
о "
-"многиÑ
дейÑÑвиÑÑ
полÑзоваÑелÑ</a>: запÑÑке
пÑиложениÑ, пÑоÑмоÑÑе каÑалогов, "
-"поÑеÑении ÑайÑов, пÑоÑлÑÑивании пеÑен.
Ðни вÑÑÑлаÑÑ Ð¸ ÑведениÑ, "
-"иденÑиÑиÑиÑÑÑÑие ÑÑÑÑойÑÑво."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"ÐÑÑгие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ñоже
ÑпионÑÑ. ÐапÑимеÑ, Spotify и дÑÑгие "
-"медвежÑи ÑÑлÑги ÑÑанÑлÑÑии заводÑÑ Ð´Ð¾ÑÑе
на каждого полÑзоваÑÐµÐ»Ñ Ð¸ <a href="
-"\"/malware/proprietary-surveillance.html#M201508210\"> заÑÑавлÑÑÑ "
-"полÑзоваÑелей иденÑиÑиÑиÑоваÑÑ ÑÐµÐ±Ñ Ð¿Ñи
оплаÑе</a>. ÐÑоÑÑ, пÑоÑÑ, пÑоклÑÑÑй "
-"Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes опÑавдÑÐ²Ð°ÐµÑ ÑÑи же пÑоÑÑÑпки, когда
оÑвеÑÑÑвенноÑÑÑ Ð»ÐµÐ¶Ð¸Ñ Ð½Ðµ на "
-"киÑайÑаÑ
, но Ð¼Ñ Ð¾ÑÑждаем ÑÑо незавиÑимо оÑ
Ñого, кÑо ÑÑо делаеÑ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +475,40 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "ТелеÑÐ¾Ð½Ñ Xiaomi <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">докладÑваÑÑ Ð¾ многиÑ
дейÑÑвиÑÑ
полÑзоваÑелÑ</a>: запÑÑке пÑиложениÑ, "
+#~ "пÑоÑмоÑÑе каÑалогов, поÑеÑении ÑайÑов,
пÑоÑлÑÑивании пеÑен. Ðни вÑÑÑлаÑÑ "
+#~ "и ÑведениÑ, иденÑиÑиÑиÑÑÑÑие
ÑÑÑÑойÑÑво."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "ÐÑÑгие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ñоже
ÑпионÑÑ. ÐапÑимеÑ, Spotify и дÑÑгие "
+#~ "медвежÑи ÑÑлÑги ÑÑанÑлÑÑии заводÑÑ
доÑÑе на каждого полÑзоваÑÐµÐ»Ñ Ð¸ <a "
+#~ "href=\"/malware/proprietary-surveillance.html#M201508210\">
заÑÑавлÑÑÑ "
+#~ "полÑзоваÑелей иденÑиÑиÑиÑоваÑÑ ÑебÑ
пÑи оплаÑе</a>. ÐÑоÑÑ, пÑоÑÑ, "
+#~ "пÑоклÑÑÑй Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes опÑавдÑÐ²Ð°ÐµÑ ÑÑи же пÑоÑÑÑпки, когда
оÑвеÑÑÑвенноÑÑÑ Ð»ÐµÐ¶Ð¸Ñ Ð½Ðµ на "
+#~ "киÑайÑаÑ
, но Ð¼Ñ Ð¾ÑÑждаем ÑÑо незавиÑимо
Ð¾Ñ Ñого, кÑо ÑÑо делаеÑ."
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary.tr.po 22 Jun 2020 09:02:56 -0000 1.25
+++ proprietary.tr.po 25 Jun 2020 23:01:27 -0000 1.26
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-13 14:40+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -306,6 +306,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -381,42 +389,6 @@
"yazılım, böyle bir Åeyi kendilerine yapmak istemeyecek kendi
kullanıcıları "
"tarafından denetlenir."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"Xiaomi telefonlar <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">kullanıcının "
-"gerçekleÅtirdiÄi bir çok eylemi raporluyor</a>: bir uygulama baÅlatma,
bir "
-"dizine bakma, bir websitesini ziyaret etme, bir Åarkı dinleme. Aygıt "
-"tanımlama bilgisini de gönderiyorlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"DiÄer özgür olmayan programlar da gizlice gözetliyor. ÃrneÄin Spotify
ve "
-"diÄer akıŠhizmet-sizlik-leri her kullanıcı hakkında bir sicil tutuyor
ve <a "
-"href=\"/malware/proprietary-surveillance.html#M201508210\">kullanıcıları "
-"ödeme yapmak için kendilerini tanıtmak zorunda bırakıyor</a>. Yok ol,
lanet "
-"Spotify!"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"Forbes, sorumluların Ãinli olmadıÄı durumlarda aynı hataları aklıyor,
ancak "
-"biz kimin yaptıÄından baÄımsız hepsini kınıyoruz."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -497,6 +469,40 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "Xiaomi telefonlar <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"
+#~ "\">kullanıcının gerçekleÅtirdiÄi bir çok eylemi raporluyor</a>: bir
"
+#~ "uygulama baÅlatma, bir dizine bakma, bir websitesini ziyaret etme, bir "
+#~ "Åarkı dinleme. Aygıt tanımlama bilgisini de gönderiyorlar."
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "DiÄer özgür olmayan programlar da gizlice gözetliyor. ÃrneÄin
Spotify ve "
+#~ "diÄer akıŠhizmet-sizlik-leri her kullanıcı hakkında bir sicil
tutuyor ve "
+#~ "<a href=\"/malware/proprietary-surveillance."
+#~ "html#M201508210\">kullanıcıları ödeme yapmak için kendilerini
tanıtmak "
+#~ "zorunda bırakıyor</a>. Yok ol, lanet Spotify!"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "Forbes, sorumluların Ãinli olmadıÄı durumlarda aynı hataları
aklıyor, "
+#~ "ancak biz kimin yaptıÄından baÄımsız hepsini kınıyoruz."
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary.zh-cn.po 23 Jun 2020 04:00:25 -0000 1.20
+++ proprietary.zh-cn.po 25 Jun 2020 23:01:27 -0000 1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-06-23 11:43+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-25 22:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -288,6 +289,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -360,37 +369,6 @@
"è¿ç§å·®å²çåè½åªæå¨ä¸æ软件ä¸ææå¯è½——èªç±è½¯ä»¶ç±å
¶ç¨æ·æ§å¶ï¼ç¨"
"æ·ä¸ä¼å
许è¿æ ·çåè½ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-"å°ç±³ææº <a
href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/"
-"exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-"
-"peoples-private-web-and-phone-use/\">大éä¸æ¥ç¨æ·çæä½</a>ï¼å¯å¨åºç¨ãæ¥çæ"
-"件夹ã访é®ç½é¡µãèå¬é³ä¹ãå®ä»¬è¿ä¸æ¥è®¾å¤è¯å«ä¿¡æ¯ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-"å
¶ä»éèªç±è®¾å¤ä¹ä¼çå¬ãä¾å¦ï¼Spotify
çæµåªä½æå¡å为æ¯ä¸ªç¨æ·å¶ä½æ¡£æ¡ï¼å¹¶ä¸ "
-"<a
href=\"/malware/proprietary-surveillance.html#M201508210\">ç¨æ·ä»æ¬¾æ¶è¦è¡¨"
-"æ身份</a>ã太è¿åäºï¼è¯¥æ»ç Spotifyï¼"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-"ä½æ¶è
ä¸ååæ¯ä¸å½äººï¼ç¦å¸æ¯å°±å¨ååæ ·çäºï¼æ
论æ¯è°ä½æ¶ï¼æ们é½è¦è°´è´£ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +451,35 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
+#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
+#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
+#~ "many actions the user takes</a>: starting an app, looking at a folder, "
+#~ "visiting a website, listening to a song. They send device identifying "
+#~ "information too."
+#~ msgstr ""
+#~ "å°ç±³ææº <a
href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/"
+#~ "exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-"
+#~
"peoples-private-web-and-phone-use/\">大éä¸æ¥ç¨æ·çæä½</a>ï¼å¯å¨åºç¨ãæ¥"
+#~
"çæ件夹ã访é®ç½é¡µãèå¬é³ä¹ãå®ä»¬è¿ä¸æ¥è®¾å¤è¯å«ä¿¡æ¯ã"
+
+#~ msgid ""
+#~ "Other nonfree programs snoop too. For instance, Spotify and other "
+#~ "streaming dis-services make a dossier about each user, and <a href=\"/"
+#~ "malware/proprietary-surveillance.html#M201508210\"> they make users "
+#~ "identify themselves to pay</a>. Out, out, damned Spotify!"
+#~ msgstr ""
+#~ "å
¶ä»éèªç±è®¾å¤ä¹ä¼çå¬ãä¾å¦ï¼Spotify
çæµåªä½æå¡å为æ¯ä¸ªç¨æ·å¶ä½æ¡£æ¡ï¼å¹¶"
+#~ "ä¸ <a
href=\"/malware/proprietary-surveillance.html#M201508210\">ç¨æ·ä»æ¬¾"
+#~ "æ¶è¦è¡¨æ身份</a>ã太è¿åäºï¼è¯¥æ»ç Spotifyï¼"
+
+#~ msgid ""
+#~ "Forbes exonerates the same wrongs when the culprits are not Chinese, but "
+#~ "we condemn this no matter who does it."
+#~ msgstr ""
+#~ "ä½æ¶è
ä¸ååæ¯ä¸å½äººï¼ç¦å¸æ¯å°±å¨ååæ ·çäºï¼æ
论æ¯è°ä½æ¶ï¼æ们é½è¦è°´è´£ã"
+
+#~ msgid ""
#~ "The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
#~ "Google Play Terms of Service</a> insist that the user of Android accept "
#~ "the presence of universal back doors in apps released by Google."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.zh-tw-diff.html 22 Jun 2020 09:02:56 -0000 1.148
+++ proprietary.zh-tw-diff.html 25 Jun 2020 23:01:27 -0000 1.149
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -153,11 +153,11 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -212,6 +212,14 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006250">
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
+ </li>
+
<li id="M202006160">
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
@@ -254,22 +262,6 @@
software—free software is controlled by its users who wouldn't
let do such things to them.</p>
</li>
-
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
- information too.</p>
-
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
-
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -332,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 09:02:56 $
+$Date: 2020/06/25 23:01:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.zh-tw.po 22 Jun 2020 09:02:56 -0000 1.159
+++ proprietary.zh-tw.po 25 Jun 2020 23:01:27 -0000 1.160
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-22 08:57+0000\n"
+"POT-Creation-Date: 2020-06-25 22:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
@@ -484,29 +492,6 @@
"them."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
-"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
-"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
-"actions the user takes</a>: starting an app, looking at a folder, visiting a "
-"website, listening to a song. They send device identifying information too."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Other nonfree programs snoop too. For instance, Spotify and other streaming "
-"dis-services make a dossier about each user, and <a href=\"/malware/"
-"proprietary-surveillance.html#M201508210\"> they make users identify "
-"themselves to pay</a>. Out, out, damned Spotify!"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Forbes exonerates the same wrongs when the culprits are not Chinese, but we "
-"condemn this no matter who does it."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- pt-br.po 24 Jun 2020 05:37:13 -0000 1.248
+++ pt-br.po 25 Jun 2020 23:01:27 -0000 1.249
@@ -1803,6 +1803,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- ru.po 24 Jun 2020 05:37:13 -0000 1.412
+++ ru.po 25 Jun 2020 23:01:27 -0000 1.413
@@ -2122,6 +2122,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- tr.po 24 Jun 2020 05:37:13 -0000 1.19
+++ tr.po 25 Jun 2020 23:01:27 -0000 1.20
@@ -1563,6 +1563,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- zh-cn.po 24 Jun 2020 05:37:13 -0000 1.16
+++ zh-cn.po 25 Jun 2020 23:01:27 -0000 1.17
@@ -1567,6 +1567,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- zh-tw.po 24 Jun 2020 05:37:13 -0000 1.186
+++ zh-tw.po 25 Jun 2020 23:01:27 -0000 1.187
@@ -1653,6 +1653,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
+"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
+"user is watching</a>. This is illegal due to the Video Privacy Protection "
+"Act of 1988, but they're circumventing it through EULAs."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/22
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29