[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www distros/po/free-distros.ar.po distros/po/fr...
From: |
GNUN |
Subject: |
www distros/po/free-distros.ar.po distros/po/fr... |
Date: |
Fri, 17 Jul 2020 15:02:17 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/07/17 15:02:16
Modified files:
distros/po : free-distros.ar.po free-distros.ca-diff.html
free-distros.ca.po free-distros.de.po
free-distros.es.po free-distros.fr.po
free-distros.hr-diff.html free-distros.hr.po
free-distros.it-diff.html free-distros.it.po
free-distros.ja.po free-distros.nl-diff.html
free-distros.nl.po free-distros.pl-diff.html
free-distros.pl.po free-distros.pot
free-distros.pt-br.po free-distros.ro-diff.html
free-distros.ro.po free-distros.ru.po
free-distros.sk.po free-distros.tr.po
free-distros.uk-diff.html free-distros.uk.po
free-distros.zh-cn.po free-distros.zh-tw.po
fry/po : happy-birthday-to-gnu.ar.po
happy-birthday-to-gnu.de.po
happy-birthday-to-gnu.fr.po
happy-birthday-to-gnu.pot
happy-birthday-to-gnu.pt-br.po
happy-birthday-to-gnu.sq.po
philosophy/po : microsoft-new-monopoly.ca.po
microsoft-new-monopoly.es.po
microsoft-new-monopoly.fr.po
microsoft-new-monopoly.nl.po
microsoft-new-monopoly.pl.po
microsoft-new-monopoly.pot
microsoft-new-monopoly.ru.po
surveillance-vs-democracy.es.po
surveillance-vs-democracy.fr.po
surveillance-vs-democracy.it-diff.html
surveillance-vs-democracy.it.po
surveillance-vs-democracy.ja.po
surveillance-vs-democracy.lt-diff.html
surveillance-vs-democracy.lt.po
surveillance-vs-democracy.ml-diff.html
surveillance-vs-democracy.ml.po
surveillance-vs-democracy.nl-diff.html
surveillance-vs-democracy.nl.po
surveillance-vs-democracy.pot
surveillance-vs-democracy.pt-br.po
surveillance-vs-democracy.ru.po
surveillance-vs-democracy.sq.po
surveillance-vs-democracy.tr.po
surveillance-vs-democracy.uk-diff.html
surveillance-vs-democracy.uk.po
surveillance-vs-democracy.zh-cn.po
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ar.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ca-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ca.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.es.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.fr.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.hr-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.hr.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ja.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.nl-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.nl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pl-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pl.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pot?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.pt-br.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ro-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ro.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.ru.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.sk.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.tr.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.uk-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.uk.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.zh-cn.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.zh-tw.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.ar.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.de.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.pot?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/fry/po/happy-birthday-to-gnu.sq.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.ca.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.nl.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.pl.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/microsoft-new-monopoly.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.tr.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.610&r2=1.611
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.434&r2=1.435
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.196&r2=1.197
Patches:
Index: distros/po/free-distros.ar.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ar.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- distros/po/free-distros.ar.po 6 Feb 2020 16:00:36 -0000 1.111
+++ distros/po/free-distros.ar.po 17 Jul 2020 19:02:11 -0000 1.112
@@ -10,7 +10,7 @@
msgstr ""
"Project-Id-Version: free-distros.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2009-09-02 21:48+0200\n"
"Last-Translator: Hossam Hossny <hossam@gnu.org>\n"
"Language-Team: Arabic\n"
@@ -535,7 +535,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.ca-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ca-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- distros/po/free-distros.ca-diff.html 26 Apr 2020 14:29:00 -0000
1.35
+++ distros/po/free-distros.ca-diff.html 17 Jul 2020 19:02:11 -0000
1.36
@@ -308,7 +308,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -384,7 +384,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.ca.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ca.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- distros/po/free-distros.ca.po 6 Feb 2020 16:00:36 -0000 1.145
+++ distros/po/free-distros.ca.po 17 Jul 2020 19:02:11 -0000 1.146
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: free-distros.ca\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2016-09-17 08:50+0200\n"
"Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
"Language-Team: Catalan <www-ca-traductors@gnu.org>\n"
@@ -546,7 +546,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.de.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- distros/po/free-distros.de.po 27 Apr 2020 08:30:40 -0000 1.144
+++ distros/po/free-distros.de.po 17 Jul 2020 19:02:11 -0000 1.145
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: free-distros.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-11-20 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -512,7 +513,14 @@
msgstr "Informationen zur Stilllegung"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.es.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.es.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- distros/po/free-distros.es.po 7 Feb 2020 12:21:01 -0000 1.193
+++ distros/po/free-distros.es.po 17 Jul 2020 19:02:11 -0000 1.194
@@ -12,7 +12,7 @@
msgstr ""
"Project-Id-Version: free-distros.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -20,6 +20,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
# type: Content of: <title>
@@ -542,7 +543,14 @@
# type: Content of: <table><tr><td><a>
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.fr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.fr.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- distros/po/free-distros.fr.po 7 Feb 2020 09:02:30 -0000 1.193
+++ distros/po/free-distros.fr.po 17 Jul 2020 19:02:11 -0000 1.194
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-07 10:01+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -514,7 +515,14 @@
msgstr "Circonstances du retrait"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.hr-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.hr-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- distros/po/free-distros.hr-diff.html 26 Apr 2020 14:29:00 -0000
1.52
+++ distros/po/free-distros.hr-diff.html 17 Jul 2020 19:02:11 -0000
1.53
@@ -318,7 +318,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -397,7 +397,7 @@
<span class="inserted"><ins><em><p
class="unprintable">Updated:</em></ins></span>
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.hr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.hr.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- distros/po/free-distros.hr.po 6 Feb 2020 16:00:36 -0000 1.56
+++ distros/po/free-distros.hr.po 17 Jul 2020 19:02:11 -0000 1.57
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2014-02-04 19:53+0100\n"
"Last-Translator: Martina Bebek <martinaporec@gmail.com>\n"
"Language-Team: GNU Croatian Translation Team <www-hr-lista@gnu.org>\n"
@@ -577,7 +577,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.it-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- distros/po/free-distros.it-diff.html 26 Apr 2020 14:29:00 -0000
1.16
+++ distros/po/free-distros.it-diff.html 17 Jul 2020 19:02:11 -0000
1.17
@@ -307,7 +307,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -383,7 +383,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- distros/po/free-distros.it.po 6 Feb 2020 16:00:37 -0000 1.191
+++ distros/po/free-distros.it.po 17 Jul 2020 19:02:11 -0000 1.192
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-12-28 23:39+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -634,7 +634,14 @@
# type: Content of: <table><tr><td><a>
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.ja.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ja.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- distros/po/free-distros.ja.po 29 Feb 2020 09:03:44 -0000 1.127
+++ distros/po/free-distros.ja.po 17 Jul 2020 19:02:11 -0000 1.128
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-29 17:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -495,7 +496,11 @@
msgstr "å¼éæ
å ±"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.nl-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.nl-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- distros/po/free-distros.nl-diff.html 26 Apr 2020 14:29:00 -0000
1.22
+++ distros/po/free-distros.nl-diff.html 17 Jul 2020 19:02:11 -0000
1.23
@@ -294,7 +294,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -370,7 +370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.nl.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.nl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- distros/po/free-distros.nl.po 6 Feb 2020 16:00:37 -0000 1.36
+++ distros/po/free-distros.nl.po 17 Jul 2020 19:02:11 -0000 1.37
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-07-30 22:18+0200\n"
"Last-Translator: Tom Uijldert <tom.uijldert@gmail.com>\n"
"Language-Team: Dutch\n"
@@ -507,7 +507,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.pl-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pl-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- distros/po/free-distros.pl-diff.html 26 Apr 2020 14:29:00 -0000
1.29
+++ distros/po/free-distros.pl-diff.html 17 Jul 2020 19:02:11 -0000
1.30
@@ -307,7 +307,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -383,7 +383,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.pl.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pl.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- distros/po/free-distros.pl.po 6 Feb 2020 16:00:37 -0000 1.141
+++ distros/po/free-distros.pl.po 17 Jul 2020 19:02:11 -0000 1.142
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2015-07-17 21:35-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -582,7 +582,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.pot
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pot,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- distros/po/free-distros.pot 6 Feb 2020 16:00:37 -0000 1.99
+++ distros/po/free-distros.pot 17 Jul 2020 19:02:11 -0000 1.100
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -396,7 +396,9 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a "
+"href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\">"
msgstr ""
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.pt-br.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.pt-br.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- distros/po/free-distros.pt-br.po 22 May 2020 22:05:05 -0000 1.114
+++ distros/po/free-distros.pt-br.po 17 Jul 2020 19:02:11 -0000 1.115
@@ -11,7 +11,7 @@
msgstr ""
"Project-Id-Version: free-distros.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-06 21:14-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -19,6 +19,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -506,7 +507,11 @@
msgstr "Circunstâncias de retirada"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.ro-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ro-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- distros/po/free-distros.ro-diff.html 26 Apr 2020 14:29:00 -0000
1.60
+++ distros/po/free-distros.ro-diff.html 17 Jul 2020 19:02:11 -0000
1.61
@@ -318,7 +318,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -397,7 +397,7 @@
<span class="inserted"><ins><em><p
class="unprintable">Updated:</em></ins></span>
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.ro.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ro.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- distros/po/free-distros.ro.po 6 Feb 2020 16:00:37 -0000 1.63
+++ distros/po/free-distros.ro.po 17 Jul 2020 19:02:11 -0000 1.64
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2013-12-11 13:41+0200\n"
"Last-Translator: Tiberiu C. Turbureanu <tct@ceata.org>\n"
"Language-Team: Romanian <ceata-traduceri@liste.ceata.org>\n"
@@ -612,7 +612,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.ru.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.ru.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- distros/po/free-distros.ru.po 6 Feb 2020 17:35:00 -0000 1.205
+++ distros/po/free-distros.ru.po 17 Jul 2020 19:02:11 -0000 1.206
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-05-11 17:17+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
# type: Content of: <title>
#. type: Content of: <title>
@@ -516,7 +517,14 @@
msgstr "Ð¡Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ ÑпиÑании"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.sk.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.sk.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- distros/po/free-distros.sk.po 6 Feb 2020 16:00:37 -0000 1.104
+++ distros/po/free-distros.sk.po 17 Jul 2020 19:02:11 -0000 1.105
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: free-distros.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2009-09-27 22:36+0200\n"
"Last-Translator: Dominik Smatana <dominik@fsf.sk>\n"
"Language-Team: Slovak <sk-i18n@linux.sk>\n"
@@ -548,7 +548,14 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.tr.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.tr.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- distros/po/free-distros.tr.po 5 Mar 2020 17:49:23 -0000 1.11
+++ distros/po/free-distros.tr.po 17 Jul 2020 19:02:11 -0000 1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-07 19:46+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.4\n"
@@ -496,7 +497,11 @@
msgstr "Ãekilme Bilgisi"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.uk-diff.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.uk-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- distros/po/free-distros.uk-diff.html 26 Apr 2020 14:29:00 -0000
1.18
+++ distros/po/free-distros.uk-diff.html 17 Jul 2020 19:02:11 -0000
1.19
@@ -307,7 +307,7 @@
</tr></thead>
<tr class="odd">
- <td class="icon"><a href="http://www.blagblagblag.org/">
+ <td class="icon"><a
href="https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/">
<img src="/graphics/distros-blag.jpg" alt="BLAG Linux and GNU"
/></a></td>
<td>BLAG Linux and GNU, a GNU/Linux distribution based on
Fedora.</td>
<td><em>Removed June 2018</em>. Removed at the request of
the
@@ -383,7 +383,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/04/26 14:29:00 $
+$Date: 2020/07/17 19:02:11 $
<!-- timestamp end -->
</p>
</div>
Index: distros/po/free-distros.uk.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.uk.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- distros/po/free-distros.uk.po 6 Feb 2020 16:00:37 -0000 1.92
+++ distros/po/free-distros.uk.po 17 Jul 2020 19:02:11 -0000 1.93
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-01-01 07:31+0200\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <>\n"
@@ -556,7 +556,11 @@
msgstr ""
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.zh-cn.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.zh-cn.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- distros/po/free-distros.zh-cn.po 8 Feb 2020 06:30:00 -0000 1.35
+++ distros/po/free-distros.zh-cn.po 17 Jul 2020 19:02:11 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-07 21:06+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -451,7 +452,11 @@
msgstr "éåºä¿¡æ¯"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: distros/po/free-distros.zh-tw.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.zh-tw.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- distros/po/free-distros.zh-tw.po 8 Feb 2020 09:59:58 -0000 1.17
+++ distros/po/free-distros.zh-tw.po 17 Jul 2020 19:02:11 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-distros.html\n"
-"POT-Creation-Date: 2020-02-06 15:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:16+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.2.4\n"
"Plural-Forms: nplurals=1; plural=0;\n"
@@ -460,7 +461,14 @@
msgstr "éåºæ¶æ¯"
#. type: Content of: <table><tr><td><a>
-msgid "<a href=\"http://www.blagblagblag.org/\">"
+# | <a [-href=\"http://www.blagblagblag.org/\">-]
+# | {+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag
+# | .org/\">+}
+#, fuzzy
+#| msgid "<a href=\"http://www.blagblagblag.org/\">"
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">"
msgstr "<a href=\"http://www.blagblagblag.org/\">"
#. type: Attribute 'alt' of: <table><tr><td><a><img>
Index: fry/po/happy-birthday-to-gnu.ar.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.ar.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- fry/po/happy-birthday-to-gnu.ar.po 8 Jan 2019 15:00:34 -0000 1.35
+++ fry/po/happy-birthday-to-gnu.ar.po 17 Jul 2020 19:02:13 -0000 1.36
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2009-09-02 21:46+0200\n"
"Last-Translator: Hossam Hossny <hossam@gnu.org>\n"
"Language-Team: Arabic\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Lokalize 1.0\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -346,9 +347,17 @@
"عÙ٠دبÙا٠٠أÙبÙÙتÙØ Ø¨Ø¯Ø¹Ù
Ù
Ù
Ø¥Ù​إس​Ø¥Ù."
#. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\">BLAG</a>,-]
+# |
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\">BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
msgstr ""
"<a href=\"http://www.blagblagblag.org/\">BLAG</a> -تÙزÙعة ÙÙÙÙس
ÙغÙÙ BLAG-"
"تÙزÙعة غÙÙ/ÙÙÙÙس Ù
بÙÙØ© عÙÙ ÙÙدÙرا."
@@ -405,7 +414,13 @@
"href=\"/server/standards/README.translations.html\">دÙÙ٠اÙترجÙ
Ø©</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright © 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2008, 2014, 2018, 2019 Ù
ؤسسة اÙبرÙ
جÙات
اÙØØ±Ø©Ø Ø§ÙÙ
ØدÙدة."
Index: fry/po/happy-birthday-to-gnu.de.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.de.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- fry/po/happy-birthday-to-gnu.de.po 30 Jan 2019 13:00:25 -0000 1.65
+++ fry/po/happy-birthday-to-gnu.de.po 17 Jul 2020 19:02:13 -0000 1.66
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: happy-birthday-to-gnu.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-01-19 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -351,9 +352,17 @@
"Ubuntu basierende GNU/Linux-Verteilung, mit Unterstützung der FSF."
#. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\">BLAG</a>,-]
+# |
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\">BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
msgstr ""
"<b><a href=\"//blagblagblag.org/\">BLAG</a></b>, eine auf Fedora basierende "
"GNU/Linux-Verteilung "
@@ -414,7 +423,13 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright © 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: fry/po/happy-birthday-to-gnu.fr.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- fry/po/happy-birthday-to-gnu.fr.po 15 Sep 2019 12:48:10 -0000 1.38
+++ fry/po/happy-birthday-to-gnu.fr.po 17 Jul 2020 19:02:13 -0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-01-05 19:21+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: \n"
#. type: Content of: <title>
@@ -357,9 +358,17 @@
"Linux basée sur Debian et Ubuntu, avec le soutien de la FSF."
#. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+# | <a [-href=\"http://www.blagblagblag.org/\">BLAG</a>,-]
+# |
{+href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\">BLAG</a>,+}
+# | BLAG Linux and GNU, a GNU/Linux distribution based on Fedora.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
msgstr ""
"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux et GNU, une "
"distribution GNU/Linux basée sur Fedora."
@@ -418,7 +427,13 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright © 2008, 2014, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: fry/po/happy-birthday-to-gnu.pot
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.pot,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- fry/po/happy-birthday-to-gnu.pot 5 Jan 2019 17:59:50 -0000 1.22
+++ fry/po/happy-birthday-to-gnu.pot 17 Jul 2020 19:02:13 -0000 1.23
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -265,8 +265,9 @@
#. type: Content of: <table><tr><td><ul><li>
msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
-"GNU/Linux distribution based on Fedora."
+"<a "
+"href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag.org/\">BLAG</a>,
"
+"BLAG Linux and GNU, a GNU/Linux distribution based on Fedora."
msgstr ""
#. type: Content of: <table><tr><td><p>
@@ -312,7 +313,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation,
Inc."
msgstr ""
#. type: Content of: <div><p>
Index: fry/po/happy-birthday-to-gnu.pt-br.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- fry/po/happy-birthday-to-gnu.pt-br.po 27 May 2020 14:59:07 -0000
1.5
+++ fry/po/happy-birthday-to-gnu.pt-br.po 17 Jul 2020 19:02:13 -0000
1.6
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: happy-birthday-to-gnu.html\n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-01-12 21:05-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -357,9 +358,14 @@
"Linux baseada no Debian e Ubuntu, com patrocÃnio da FSF."
#. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
msgstr ""
"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux e GNU, uma "
"distribuição GNU/Linux baseada no Fedora."
@@ -417,7 +423,11 @@
"envio de traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: fry/po/happy-birthday-to-gnu.sq.po
===================================================================
RCS file: /web/www/www/fry/po/happy-birthday-to-gnu.sq.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- fry/po/happy-birthday-to-gnu.sq.po 9 Feb 2019 17:59:55 -0000 1.44
+++ fry/po/happy-birthday-to-gnu.sq.po 17 Jul 2020 19:02:13 -0000 1.45
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: \n"
-"POT-Creation-Date: 2019-01-05 17:56+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-02-09 19:15+0200\n"
"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.2\n"
# type: Content of: <table><tr><td><p>
@@ -391,9 +392,14 @@
# type: Content of: <table><tr><td><ul><li>
#. type: Content of: <table><tr><td><ul><li>
-msgid ""
-"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a GNU/"
-"Linux distribution based on Fedora."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux and GNU, a "
+#| "GNU/Linux distribution based on Fedora."
+msgid ""
+"<a href=\"https://web.archive.org/web/20200620205430/http://www.blagblagblag."
+"org/\">BLAG</a>, BLAG Linux and GNU, a GNU/Linux distribution based on "
+"Fedora."
msgstr ""
"<a href=\"http://www.blagblagblag.org/\">BLAG</a>, BLAG Linux dhe GNU, një "
"shpërndarje GNU/Linux e bazuar në Fedora."
@@ -454,7 +460,11 @@
"standards/README.translations.html\">README për përkthimet</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2008, 2014, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2008, 2014, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr ""
"Të drejta kopjimi © 2008, 2014, 2018, 2019 Free Software Foundation, "
"Inc."
Index: philosophy/po/microsoft-new-monopoly.ca.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.ca.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/microsoft-new-monopoly.ca.po 17 Sep 2016 08:58:45 -0000
1.29
+++ philosophy/po/microsoft-new-monopoly.ca.po 17 Jul 2020 19:02:13 -0000
1.30
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.ca\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2016-09-17 10:02+0200\n"
"Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
"Language-Team: Catalan <www-ca-traductors@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
# type: Content of: <title>
#. type: Content of: <title>
@@ -139,13 +140,30 @@
# type: Content of: <p>
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"La pròxima versió de Microsoft Word utilitzarà formats que impliquen una "
"tècnica sobre la qual Microsoft afirma tenir una patent. Microsoft n'ofereix
"
@@ -361,7 +379,10 @@
"traducció al català del web de GNU."
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/microsoft-new-monopoly.es.po 15 Sep 2019 21:06:05 -0000
1.13
+++ philosophy/po/microsoft-new-monopoly.es.po 17 Jul 2020 19:02:13 -0000
1.14
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2016-05-03 12:24+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.6.10\n"
@@ -134,13 +135,30 @@
"archivos de Word. Pero Microsoft no ha sido derrotado aún."
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"La próxima versión de Microsoft Word utilizará formatos que incluyen una "
"técnica de la cual Microsoft afirma poseer la patente. Microsoft ofrece una "
@@ -351,7 +369,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/po/microsoft-new-monopoly.fr.po 3 Nov 2018 21:44:35 -0000
1.43
+++ philosophy/po/microsoft-new-monopoly.fr.po 17 Jul 2020 19:02:13 -0000
1.44
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-11-03 22:24+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -133,13 +134,30 @@
"fichiers Word. Mais Microsoft n'a pas dit son dernier mot."
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"La prochaine version de Microsoft Word utilisera des formats qui mettent en "
"Åuvre une technique sur laquelle Microsoft prétend détenir un brevet. "
@@ -350,7 +368,10 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.nl.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/microsoft-new-monopoly.nl.po 22 May 2017 07:36:03 -0000
1.11
+++ philosophy/po/microsoft-new-monopoly.nl.po 17 Jul 2020 19:02:13 -0000
1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Tom Uijldert <tom.uijldert@gmail.com>\n"
"Language-Team: Dutch\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid "Microsoft's New Monopoly - GNU Project - Free Software Foundation"
@@ -126,13 +127,30 @@
"verslagen."
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"De volgende versie van Microsoft Word zal formaten gebruiken waarvan "
"Microsoft beweert dat er patenten op rusten. Microsoft biedt verder een "
@@ -339,7 +357,10 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.pl.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- philosophy/po/microsoft-new-monopoly.pl.po 22 Apr 2017 13:00:43 -0000
1.20
+++ philosophy/po/microsoft-new-monopoly.pl.po 17 Jul 2020 19:02:13 -0000
1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2015-10-31 20:34-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 "
"|| n%100>=20) ? 1 : 2);\n"
"X-Generator: Virtaal 0.7.1\n"
@@ -132,13 +133,30 @@
"Microsoft jeszcze nie zostaÅ pokonany."
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"NastÄpna wersja programu Microsoft Word bÄdzie stosowaÄ formaty plików, "
"wykorzystujÄ
ce technikÄ opatentowanÄ
przez Microsoft. Microsoft oferuje "
@@ -360,7 +378,10 @@
"tÅumaczeÅ</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.pot
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/po/microsoft-new-monopoly.pot 18 Nov 2016 07:32:59 -0000
1.17
+++ philosophy/po/microsoft-new-monopoly.pot 17 Jul 2020 19:02:13 -0000
1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-11-18 06:59+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,9 +94,9 @@
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a "
-"href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> "
-"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a "
+"href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
"
+"the license</a>."
msgstr ""
#. type: Content of: <p>
@@ -225,7 +225,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/microsoft-new-monopoly.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/microsoft-new-monopoly.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/microsoft-new-monopoly.ru.po 2 May 2016 16:33:37 -0000
1.12
+++ philosophy/po/microsoft-new-monopoly.ru.po 17 Jul 2020 19:02:13 -0000
1.13
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: microsoft-new-monopoly.html\n"
-"POT-Creation-Date: 2016-05-02 11:58+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2016-05-02 17:34+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid "Microsoft's New Monopoly - GNU Project - Free Software Foundation"
@@ -134,13 +135,30 @@
"Ñайлов Word. Ðо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft еÑе
не обÑгÑали."
#. type: Content of: <p>
+# | The next version of Microsoft Word will use formats that involve a
+# | technique that Microsoft claims to hold a patent on. Microsoft offers a
+# | royalty-free patent license for certain limited purposes, but it is so
+# | limited that it does not allow free software. [-You can see the license
+# | here:-] {+Here is+} <a
+# | [-href=\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\">
+# | https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>.-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/gg463420(v=msdn.10)\">
+# | the license</a>.+}
+#, fuzzy
+#| msgid ""
+#| "The next version of Microsoft Word will use formats that involve a "
+#| "technique that Microsoft claims to hold a patent on. Microsoft offers a "
+#| "royalty-free patent license for certain limited purposes, but it is so "
+#| "limited that it does not allow free software. You can see the license "
+#| "here: <a href=\"https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx\"> https://msdn.microsoft.com/en-us/windows/hardware/"
+#| "gg463420.aspx</a>."
msgid ""
"The next version of Microsoft Word will use formats that involve a technique "
"that Microsoft claims to hold a patent on. Microsoft offers a royalty-free "
"patent license for certain limited purposes, but it is so limited that it "
-"does not allow free software. You can see the license here: <a href="
-"\"https://msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx\"> https://"
-"msdn.microsoft.com/en-us/windows/hardware/gg463420.aspx</a>."
+"does not allow free software. Here is <a href=\"https://docs.microsoft.com/"
+"en-us/previous-versions/gg463420(v=msdn.10)\"> the license</a>."
msgstr ""
"Ð ÑледÑÑÑей веÑÑии Microsoft Word бÑдÑÑ
пÑименÑÑÑÑÑ ÑоÑмаÑÑ, коÑоÑÑе "
"пÑивлекаÑÑ ÑеÑ
никÑ, на коÑоÑÑÑ,
по заÑÐ²Ð»ÐµÐ½Ð¸Ñ Microsoft, Ñ Ð½ÐµÐµ "
@@ -360,7 +378,10 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
-msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+# | Copyright © 2005, 2009, 2015, [-2016-] {+2016, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2005, 2009, 2015, 2016 Richard Stallman"
+msgid "Copyright © 2005, 2009, 2015, 2016, 2020 Richard Stallman"
msgstr ""
"Copyright © 2005, 2009, 2015, 2016 Richard Stallman<br />Copyright "
"© 2015, 2016 Free Software Foundation, Inc. (translation)"
Index: philosophy/po/surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- philosophy/po/surveillance-vs-democracy.es.po 15 Jan 2020 12:36:19
-0000 1.104
+++ philosophy/po/surveillance-vs-democracy.es.po 17 Jul 2020 19:02:13
-0000 1.105
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-10-06 12:22+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -1105,16 +1106,38 @@
"Estadounidense por las Libertades Civiles está a favor de esto."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Las corporaciones no son personas, y no tienen derechos "
@@ -1245,7 +1268,11 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- philosophy/po/surveillance-vs-democracy.fr.po 5 Oct 2019 11:10:12
-0000 1.121
+++ philosophy/po/surveillance-vs-democracy.fr.po 17 Jul 2020 19:02:13
-0000 1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-10-05 13:02+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -1112,16 +1113,38 @@
"la force diminuer de près de 60 %</a>. L'ACLU y est favorable."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Les entreprises ne sont pas des personnes et ne peuvent "
@@ -1275,7 +1298,11 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.it-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/surveillance-vs-democracy.it-diff.html 30 Dec 2019
12:08:33 -0000 1.9
+++ philosophy/po/surveillance-vs-democracy.it-diff.html 17 Jul 2020
19:02:13 -0000 1.10
@@ -532,7 +532,8 @@
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+<span
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</strong></del></span>
+<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</em></ins></span>
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019 Richard
Stallman</p>
+<p>Copyright © 2015, 2016, 2017, 2018, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -636,7 +637,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- philosophy/po/surveillance-vs-democracy.it.po 5 Oct 2019 09:31:02
-0000 1.117
+++ philosophy/po/surveillance-vs-democracy.it.po 17 Jul 2020 19:02:13
-0000 1.118
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-04-18 22:23+0200\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -1131,16 +1131,38 @@
"a>). LâACLU è favorevole a questo provvedimento."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"Le imprese non sono persone, e <a href=\"http://action.citizen.org/p/dia/"
"action3/common/public/?action_KEY=12266\">non godono di diritti umani</a>. Ã
"
@@ -1265,7 +1287,11 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- philosophy/po/surveillance-vs-democracy.ja.po 30 Apr 2020 19:04:01
-0000 1.64
+++ philosophy/po/surveillance-vs-democracy.ja.po 17 Jul 2020 19:02:13
-0000 1.65
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-04-30 22:08+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -1005,16 +1006,27 @@
"使ç¨ã60%éä¸ããããã§ã</a>ãACLUã¯ããã好ã¾ããèãã¦ãã¾ãã"
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">ä¼æ¥ã¯äººã
ã§ã¯ãªãã人権ã®è³æ
¼ã¯ããã¾ãã</a>ãåå¦çãç"
@@ -1132,7 +1144,9 @@
"README.translations.html\">翻訳 README</a>ãã覧ãã ããã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/surveillance-vs-democracy.lt-diff.html 30 Dec 2019
12:08:33 -0000 1.35
+++ philosophy/po/surveillance-vs-democracy.lt-diff.html 17 Jul 2020
19:02:13 -0000 1.36
@@ -565,7 +565,8 @@
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+<span
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</strong></del></span>
+<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</em></ins></span>
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
@@ -661,7 +662,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019</em></ins></span>
Richard Stallman</p>
+<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -671,7 +672,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- philosophy/po/surveillance-vs-democracy.lt.po 5 Oct 2019 09:31:02
-0000 1.36
+++ philosophy/po/surveillance-vs-democracy.lt.po 17 Jul 2020 19:02:13
-0000 1.37
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2015-12-16 13:11+0100\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -1324,16 +1324,38 @@
"60 %</a>. ACLU Å¡itam teikia pirmenybÄ."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Korporacijos nÄra žmonÄs ir žmogaus teisÄs
netaikytinos</"
@@ -1464,10 +1486,11 @@
"PERSKAITYKITEMANE</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015, 2016, 2017, 2018, 2019+} Richard Stallman
+# | Copyright © [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020+} Richard
+# | Stallman
#, fuzzy
#| msgid "Copyright © 2015 Richard Stallman"
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.ml-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/surveillance-vs-democracy.ml-diff.html 3 May 2020
17:32:45 -0000 1.3
+++ philosophy/po/surveillance-vs-democracy.ml-diff.html 17 Jul 2020
19:02:13 -0000 1.4
@@ -532,7 +532,8 @@
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+<span
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</strong></del></span>
+<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</em></ins></span>
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019 Richard
Stallman</p>
+<p>Copyright © 2015, 2016, 2017, 2018, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -636,7 +637,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/03 17:32:45 $
+$Date: 2020/07/17 19:02:13 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/surveillance-vs-democracy.ml.po 3 May 2020 17:32:45
-0000 1.6
+++ philosophy/po/surveillance-vs-democracy.ml.po 17 Jul 2020 19:02:13
-0000 1.7
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-07-12 23:15+0200\n"
"Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
"Language-Team: Malayalam <>\n"
@@ -1092,16 +1092,38 @@
"à´à´¤à´¿à´¨àµàµ à´
à´¨àµà´àµà´²à´®à´¾à´£àµàµ."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">à´àµàµ¼à´ªàµà´ªà´±àµà´·à´¨àµà´àµ¾
à´à´¨à´àµà´à´³à´²àµà´², à´
à´¤àµàµ
മനàµà´·àµà´¯à´¾à´µà´à´¾à´¶à´àµà´àµ¾ à´
ർഹിà´àµà´àµà´¨àµà´¨à´¿à´²àµà´²</a>. "
@@ -1233,7 +1255,11 @@
"README.translations.html\">Translations README</a> à´¨àµà´àµà´àµà´."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- philosophy/po/surveillance-vs-democracy.nl-diff.html 30 Dec 2019
12:08:33 -0000 1.25
+++ philosophy/po/surveillance-vs-democracy.nl-diff.html 17 Jul 2020
19:02:13 -0000 1.26
@@ -536,7 +536,8 @@
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+<span
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</strong></del></span>
+<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</em></ins></span>
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
@@ -630,7 +631,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -640,7 +641,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:13 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- philosophy/po/surveillance-vs-democracy.nl.po 5 Oct 2019 09:31:02
-0000 1.42
+++ philosophy/po/surveillance-vs-democracy.nl.po 17 Jul 2020 19:02:13
-0000 1.43
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:13+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -1184,16 +1184,38 @@
"is hier voorstander van."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Bedrijven zijn geen mensen, en kunnen geen aanspraak "
@@ -1319,10 +1341,11 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-# | Copyright © 2015, 2016, [-2017-] {+2017, 2018, 2019+} Richard Stallman
+# | Copyright © 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+} Richard
+# | Stallman
#, fuzzy
#| msgid "Copyright © 2015, 2016, 2017 Richard Stallman"
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- philosophy/po/surveillance-vs-democracy.pot 5 Oct 2019 09:31:02 -0000
1.50
+++ philosophy/po/surveillance-vs-democracy.pot 17 Jul 2020 19:02:13 -0000
1.51
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -670,7 +670,7 @@
#. type: Content of: <div><div><p>
msgid ""
"<a "
-"href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
"
+"href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
"
"are not people, and not entitled to human rights</a>. It is legitimate to "
"require businesses to publish the details of processes that might cause "
"chemical, biological, nuclear, fiscal, computational (e.g., <a "
@@ -762,7 +762,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- philosophy/po/surveillance-vs-democracy.pt-br.po 22 May 2020 22:05:26
-0000 1.57
+++ philosophy/po/surveillance-vs-democracy.pt-br.po 17 Jul 2020 19:02:13
-0000 1.58
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-10-12 07:07-0200\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -1066,16 +1067,27 @@
"a>;. A ACLU concorda com isto."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Empresas não são pessoas, e a elas não se aplicam
diretos "
@@ -1254,7 +1266,9 @@
"envio de traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- philosophy/po/surveillance-vs-democracy.ru.po 6 Oct 2019 04:29:16
-0000 1.111
+++ philosophy/po/surveillance-vs-democracy.ru.po 17 Jul 2020 19:02:13
-0000 1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-06-26 09:27+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -1066,16 +1067,38 @@
"поддеÑÐ¶Ð¸Ð²Ð°ÐµÑ ÑÑо."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+# | <a
+# |
[-href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations-]
+# |
{+href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations+}
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\"> ÐоÑпоÑаÑии — не лÑди, Ñ Ð½Ð¸Ñ
не должно бÑÑÑ "
@@ -1202,7 +1225,11 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+} Richard
+# | Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr ""
"Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman<br /"
">Copyright © 2015, 2016, 2017, 2018, 2019 Free Software Foundation, "
Index: philosophy/po/surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- philosophy/po/surveillance-vs-democracy.sq.po 1 Dec 2019 10:29:59
-0000 1.97
+++ philosophy/po/surveillance-vs-democracy.sq.po 17 Jul 2020 19:02:14
-0000 1.98
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.2\n"
#. type: Content of: <title>
@@ -1076,16 +1077,27 @@
"ACLU është në favor të kësaj."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Korporatat nuk janë njerëz, ndaj as subjekt i të
drejtave "
@@ -1212,7 +1224,9 @@
"standards/README.translations.html\">README për përkthimet</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Të drejta kopjimi © 2015, 2016, 2017, 2018, 2019 Richard
Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.tr.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/surveillance-vs-democracy.tr.po 5 Mar 2020 17:49:24
-0000 1.5
+++ philosophy/po/surveillance-vs-democracy.tr.po 17 Jul 2020 19:02:14
-0000 1.6
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-01-18 20:11+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.2.4\n"
#. type: Content of: <title>
@@ -1042,16 +1043,27 @@
"\">güç kullanımlarının %60 oranında düÅtüÄü</a> bulundu. ACLU
bundan yana."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">Åirketler insan deÄildir ve insan haklarına sahip "
@@ -1175,7 +1187,9 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/surveillance-vs-democracy.uk-diff.html 30 Dec 2019
12:08:33 -0000 1.16
+++ philosophy/po/surveillance-vs-democracy.uk-diff.html 17 Jul 2020
19:02:14 -0000 1.17
@@ -532,7 +532,8 @@
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+<span
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</strong></del></span>
+<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations</em></ins></span>
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
@@ -626,7 +627,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -636,7 +637,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:33 $
+$Date: 2020/07/17 19:02:14 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- philosophy/po/surveillance-vs-democracy.uk.po 5 Oct 2019 09:31:02
-0000 1.77
+++ philosophy/po/surveillance-vs-democracy.uk.po 17 Jul 2020 19:02:14
-0000 1.78
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-05-23 21:01+0200\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <>\n"
@@ -1159,16 +1159,27 @@
"ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. ACLU пÑдÑÑимÑÑ Ñе."
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\"> ÐоÑпоÑаÑÑÑ — не лÑди, Ñ Ð½Ð¸Ñ
не повинно бÑÑи "
@@ -1295,7 +1306,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2015, 2016, 2017, 2018 Richard Stallman"
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018 Ð ÑÑаÑд СÑолмен"
#. type: Content of: <div><p>
Index: philosophy/po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- philosophy/po/surveillance-vs-democracy.zh-cn.po 6 Oct 2019 08:28:38
-0000 1.47
+++ philosophy/po/surveillance-vs-democracy.zh-cn.po 17 Jul 2020 19:02:14
-0000 1.48
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2019-10-05 09:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2019-10-06 16:12+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -910,16 +911,27 @@
"ç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã"
#. type: Content of: <div><div><p>
-msgid ""
-"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
-"action_KEY=12266\">Corporations are not people, and not entitled to human "
-"rights</a>. It is legitimate to require businesses to publish the details "
-"of processes that might cause chemical, biological, nuclear, fiscal, "
-"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
-"political (e.g., lobbying) hazards to society, to whatever level is needed "
-"for public well-being. The danger of these operations (consider the BP oil "
-"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
-"terrorism."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+#| "action_KEY=12266\">Corporations are not people, and not entitled to human "
+#| "rights</a>. It is legitimate to require businesses to publish the "
+#| "details of processes that might cause chemical, biological, nuclear, "
+#| "fiscal, computational (e.g., <a href=\"http://DefectiveByDesign.org"
+#| "\">DRM</a>) or political (e.g., lobbying) hazards to society, to whatever "
+#| "level is needed for public well-being. The danger of these operations "
+#| "(consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal "
+#| "crisis) dwarfs that of terrorism."
+msgid ""
+"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
+"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
+"people, and not entitled to human rights</a>. It is legitimate to require "
+"businesses to publish the details of processes that might cause chemical, "
+"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
+"society, to whatever level is needed for public well-being. The danger of "
+"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
+"the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\">ä¼ä¸ä¸æ¯äººï¼å®ä»¬æ²¡æ人æ</a>ãè¦æ±åä¸å
¬å¸å
¬å¼å
¶å¯è½å¯¹ç¤¾ä¼"
@@ -1047,7 +1059,9 @@
"ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2016, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/de.po 13 Jul 2020 10:02:36 -0000 1.196
+++ proprietary/po/de.po 17 Jul 2020 19:02:14 -0000 1.197
@@ -8280,8 +8280,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -12747,6 +12747,39 @@
"Tastaturtreiber mit Keylogger</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"<a href=\"https://docs.microsoft.com/de-de/windows/privacy/configure-windows-"
+"diagnostic-data-in-your-organization#stufe-vollständig\">Telemetrie-Stufe "
+"âVollständigâ</a> ermöglicht Microsoft Windows-Ingenieuren unter
anderem "
+"Zugriff auf Registrierungsschlüssel, <a
href=\"https://technet.microsoft.com/"
+"de-de/library/cc939702.aspx\">die vertrauliche Informationen wie das "
+"Administrator-Anmeldekennwort enthalten können</a>."
+
+#. type: Content of: <div><div><ul><li><p>
# | <a
# |
[-href=\"http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\">-]
# |
{+href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\">+}
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary/po/es.po 13 Jul 2020 10:02:36 -0000 1.282
+++ proprietary/po/es.po 17 Jul 2020 19:02:14 -0000 1.283
@@ -7815,11 +7815,25 @@
"tiempo completo."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La mayorÃa de las aplicaciones son <cite>malware</cite>, pero la aplicación
"
@@ -12505,6 +12519,39 @@
"contiene un registrador de teclas</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
+"telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder, "
+"entre otras cosas, a claves de registro <a href=\"https://technet.microsoft."
+"com/en-us/library/cc939702.aspx\">que contienen información sensible, como "
+"la contraseña de inicio de sesión del administrador</a>."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -13425,6 +13472,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "La mayorÃa de las aplicaciones son <cite>malware</cite>, pero la "
+#~ "aplicación de la campaña de Trump, al igual que la de Modi<a href="
+#~ "\"#TransNote1\" id=\"TransNote1-rev\"><sup>[1]</sup></a>, es <a href="
+#~ "\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-"
+#~ "invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">particularmente nociva, pues no solo ella misma espÃa a los usuarios, "
+#~ "sino que además ayuda a empresas a espiarlos</a>."
+
#, fuzzy
#~| msgid ""
#~| "“Bossware” is malware that bosses <a href=\"https://www.eff."
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary/po/fr.po 13 Jul 2020 10:40:56 -0000 1.346
+++ proprietary/po/fr.po 17 Jul 2020 19:02:14 -0000 1.347
@@ -6983,11 +6983,25 @@
"\">appareils d'écoute permanente</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La plupart des applis sont des logiciels malveillants, mais l'appli de "
@@ -11051,6 +11065,39 @@
"contient un enregistreur de frappe <cite>[key logger]</cite></a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"Le <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\">niveau "
+"« Complet »</a> de télémétrie permet aux ingénieurs de Microsoft
d'accéder, "
+"entre autres, à des clés de registre qui contiennent <a href=\"https://"
+"technet.microsoft.com/en-us/library/cc939702.aspx\">de l'information "
+"sensible comme le mot de passe administrateur</a>."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -11893,3 +11940,18 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "La plupart des applis sont des logiciels malveillants, mais l'appli de "
+#~ "campagne de Trump, ainsi que celle de Modi [NdT: Narendra Modi, candidat "
+#~ "aux élections présidentielles indiennes] l'est tout particulièrement,
car "
+#~ "<a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+#~ "hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">non seulement elle espionne les utilisateurs pour son propre compte, "
+#~ "mais elle aide des entreprises à les espionner</a>."
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/it.po 13 Jul 2020 10:02:36 -0000 1.196
+++ proprietary/po/it.po 17 Jul 2020 19:02:14 -0000 1.197
@@ -7829,8 +7829,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -11979,6 +11979,40 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
[-href=\"https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level\">-]
+# |
{+href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">+}
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/configuration/"
+#| "configure-windows-telemetry-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"La <a href=\"https://docs.microsoft.com/en-us/windows/configuration/"
+"configure-windows-telemetry-in-your-organization#full-level\"> modalità "
+"“Completa” della telemetria</a> permette allo staff di Microsoft "
+"di accedere, tra l'altro, a chiavi di registro che <a href=\"https://technet."
+"microsoft.com/en-us/library/cc939702.aspx\">possono contenere password "
+"amministrative e altre informazioni sensibili</a>."
+
+#. type: Content of: <div><div><ul><li><p>
# | <a
# |
[-href=\"http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\">-]
# |
{+href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping\">+}
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary/po/ja.po 13 Jul 2020 10:02:36 -0000 1.204
+++ proprietary/po/ja.po 17 Jul 2020 19:02:14 -0000 1.205
@@ -6008,8 +6008,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -9353,6 +9353,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/malware-mobiles.de-diff.html 26 Jun 2020 23:31:13 -0000
1.80
+++ proprietary/po/malware-mobiles.de-diff.html 17 Jul 2020 19:02:14 -0000
1.81
@@ -631,8 +631,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -1614,7 +1614,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/malware-mobiles.de.po 26 Jun 2020 23:31:13 -0000
1.136
+++ proprietary/po/malware-mobiles.de.po 17 Jul 2020 19:02:14 -0000
1.137
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1038,8 +1038,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary/po/malware-mobiles.es.po 27 Jun 2020 11:59:12 -0000
1.181
+++ proprietary/po/malware-mobiles.es.po 17 Jul 2020 19:02:14 -0000
1.182
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -875,11 +876,25 @@
"\">dispositivos de escucha a tiempo completo</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La mayorÃa de las aplicaciones son <cite>malware</cite>, pero la aplicación
"
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary/po/malware-mobiles.fr.po 27 Jun 2020 06:06:37 -0000
1.199
+++ proprietary/po/malware-mobiles.fr.po 17 Jul 2020 19:02:14 -0000
1.200
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-06-27 08:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -871,11 +872,25 @@
"\">appareils d'écoute permanente</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La plupart des applis sont des logiciels malveillants, mais l'appli de "
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/malware-mobiles.it-diff.html 26 Jun 2020 23:31:13 -0000
1.85
+++ proprietary/po/malware-mobiles.it-diff.html 17 Jul 2020 19:02:14 -0000
1.86
@@ -599,8 +599,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -1627,7 +1627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/malware-mobiles.it.po 26 Jun 2020 23:31:13 -0000
1.136
+++ proprietary/po/malware-mobiles.it.po 17 Jul 2020 19:02:14 -0000
1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -996,8 +996,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.ja-diff.html 26 Jun 2020 23:31:13 -0000
1.102
+++ proprietary/po/malware-mobiles.ja-diff.html 17 Jul 2020 19:02:14 -0000
1.103
@@ -596,8 +596,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -1473,7 +1473,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/17 19:02:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.ja.po 26 Jun 2020 23:31:13 -0000
1.127
+++ proprietary/po/malware-mobiles.ja.po 17 Jul 2020 19:02:14 -0000
1.128
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -756,8 +756,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.pot 26 Jun 2020 23:31:13 -0000 1.102
+++ proprietary/po/malware-mobiles.pot 17 Jul 2020 19:02:14 -0000 1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -603,8 +603,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
"
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/malware-mobiles.ru.po 27 Jun 2020 07:59:02 -0000
1.238
+++ proprietary/po/malware-mobiles.ru.po 17 Jul 2020 19:02:14 -0000
1.239
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -862,11 +863,25 @@
"позволÑÐµÑ Ð¿ÑевÑаÑаÑÑ Ð¸Ñ
в ÑÑаÑнÑе
подÑлÑÑиваÑÑие ÑÑÑÑойÑÑва."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÐолÑÑинÑÑво пÑиложений вÑедоноÑнÑ, но
пÑиложение кампании ТÑампа, как и "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary/po/nl.po 13 Jul 2020 10:02:36 -0000 1.197
+++ proprietary/po/nl.po 17 Jul 2020 19:02:14 -0000 1.198
@@ -5422,8 +5422,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -8710,6 +8710,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/pl.po 13 Jul 2020 10:02:36 -0000 1.196
+++ proprietary/po/pl.po 17 Jul 2020 19:02:14 -0000 1.197
@@ -4882,8 +4882,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -8191,6 +8191,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary/po/pot 13 Jul 2020 10:02:36 -0000 1.195
+++ proprietary/po/pot 17 Jul 2020 19:02:14 -0000 1.196
@@ -4610,8 +4610,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -7432,6 +7432,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary/po/proprietary-surveillance.de-diff.html 9 Jul 2020
17:32:22 -0000 1.117
+++ proprietary/po/proprietary-surveillance.de-diff.html 17 Jul 2020
19:02:14 -0000 1.118
@@ -299,9 +299,9 @@
<span
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"></strong></del></span>
<span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"></em></ins></span>
“Full” telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys <a
- href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
- can contain sensitive information like administrator's login
+ engineers to access, among other things, registry keys <a <span
class="removed"><del><strong>href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+ which</em></ins></span> can contain sensitive information like
administrator's login
<span class="removed"><del><strong>password</a>.</p></li>
<li><p>Windows DRM</strong></del></span>
@@ -596,8 +596,8 @@
<span class="removed"><del><strong>recorded</strong></del></span> <span
class="inserted"><ins><em>are malware, but
Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on</em></ins></span> them <span
class="removed"><del><strong>and text messages and emails to
snoopers</a>.</p>
@@ -756,86 +756,57 @@
<li id="M201709210">
<p>In</em></ins></span> the <span class="removed"><del><strong>HTML
pages returned to</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
“turning off” WiFi and Bluetooth</em></ins></span> the
- <span class="removed"><del><strong>users. The stated purpose of the JS
injection is</strong></del></span> <span class="inserted"><ins><em>obvious way
<a
+ <span class="removed"><del><strong>users. The
stated</strong></del></span> <span class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
- to use</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>without having your fingerprints taken. Users would
have
- no way to tell whether</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
<li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>have
- confirmed</strong></del></span> <span class="inserted"><ins><em>on
iThings <a
+ <p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection</strong></del></span>
- <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and
display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>at least
30 days.</p></em></ins></span>
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span>
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of</strong></del></span> <span class="inserted"><ins><em>photos
+ <li id="M201509240">
+ <p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up
to date on all your devices. Any edits you
- make</em></ins></span> are <span class="removed"><del><strong>not in
fact</strong></del></span> <span class="inserted"><ins><em>automatically
updated everywhere. […] </p></blockquote>
+ take, and keeps them up to date on all your devices. Any edits you
+ make are automatically updated everywhere. […]
</p></blockquote>
- <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
- for that word</strong></del></span>
- <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>a way to</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track
users</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104">
deactivate
- iCloud</a>, but it's active</em></ins></span> by <span
class="inserted"><ins><em>default so it still counts as a
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed</em></ins></span>
to <span class="removed"><del><strong>ultrasound</strong></del></span> <span
class="inserted"><ins><em>break Apple's
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
security to get at them, but NSA can access any of them through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
@@ -843,83 +814,60 @@
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data</em></ins></span> from <span
class="removed"><del><strong>beacons placed in stores or played by TV
programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>iPhones for the state</a>.</p>
+ remotely extract some data from iPhones for the state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></em></ins></span>
+ not as much as Apple claims</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
+ <li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
+ Several “features” of iOS seem to exist
+ for no possible</em></ins></span> purpose <span
class="inserted"><ins><em>other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401100">
- <p>The</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <li id="M201401100">
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
- is <span class="removed"><del><strong>not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
+ tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p></em></ins></span>
+ <p>Users cannot make an Apple ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
-
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -929,63 +877,33 @@
<ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking. This is
- yet another example of</strong></del></span> <span
class="inserted"><ins><em>a song. They send device identifying
+ <p>Xiaomi phones <a
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other</em></ins></span> nonfree <span
class="removed"><del><strong>software pretending to obey the user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>programs snoop too. For instance, Spotify and
- other streaming dis-services make</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
- unthinkable with free software.</p>
+ <p>Other nonfree programs snoop too. For instance, Spotify and
+ other streaming dis-services make a dossier about each user, and <a
+ href="/malware/proprietary-surveillance.html#M201508210"> they make
+ users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- </li>
-
- <li><p>More than 73% of the most popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>dossier
about each user,</em></ins></span> and <span
class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em><a
- href="/malware/proprietary-surveillance.html#M201508210"> they
make</em></ins></span>
- users <span class="removed"><del><strong>with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>identify
themselves</em></ins></span> to <span class="inserted"><ins><em>pay</a>.
Out, out, damned Spotify!</p>
-
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>same wrongs
when</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they</strong></del></span> <span
class="inserted"><ins><em>culprits</em></ins></span> are not <span
class="removed"><del><strong>free software. The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that the usual analytics tools are
- legitimate,</strong></del></span> <span
class="inserted"><ins><em>Chinese,</em></ins></span>
- but <span class="removed"><del><strong>is that valid? Software developers
have</strong></del></span> <span class="inserted"><ins><em>we condemn
this</em></ins></span> no <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
+ but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
- <span class="removed"><del><strong>analyze</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising</em></ins></span>
- what <span class="removed"><del><strong>users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>the “consent” was
for.</p></em></ins></span>
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201811230">
- <p>An</em></ins></span> Android <span
class="removed"><del><strong>apps (but not</strong></del></span> <span
class="inserted"><ins><em>phone was observed to track location even while
+ <li id="M201811230">
+ <p>An Android phone was observed to track location even while
in airplane mode. It didn't send the location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data, and sent them all later</a>.</p>
</li>
@@ -999,16 +917,15 @@
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
+ <p>Even if you disable Google Maps and location tracking, you must
disable Google Play itself to completely stop the tracking. This is
yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
@@ -1458,8 +1375,8 @@
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of the <span class="removed"><del><strong>JS
injection</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied by researchers were found to snoop
and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
@@ -1497,8 +1414,8 @@
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android apps</em></ins></span>
+ is <span class="inserted"><ins><em>pervasive and sometimes very clever.
Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1512,7 +1429,8 @@
<p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.)</small></p>
+ referring</em></ins></span> to <span class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>zero price.)</small></p>
</li>
<li id="M201707270">
@@ -1520,36 +1438,58 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the
contrary,</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>snooping of these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
+ <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>source
code to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
+ <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop</em></ins></span> on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1557,11 +1497,14 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -1581,11 +1524,13 @@
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
- <p>Pairs of Android apps can collude
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
+ <p>Pairs of <span class="removed"><del><strong>Android apps can
collude to transmit users' personal</strong></del></span> <span
class="inserted"><ins><em>Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
@@ -1610,50 +1555,101 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user</em></ins></span> data to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
</li>
- <li id="M201611280">
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611280">
+ <p>The Uber</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>tracks</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>user's
+ consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading</strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
massive surveillance.</p>
</li>
<li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
+ research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>privacy</em></ins></span> and <span
class="removed"><del><strong>Conditions”</strong></del></span> <span
class="inserted"><ins><em>security of
+ 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>“in
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an
obscurely worded EULA.</p>
+
+<p>However, to truly protect people's</strong></del></span> <span
class="inserted"><ins><em>the promises
+ for</em></ins></span> privacy, <span class="removed"><del><strong>we must
prevent Google</strong></del></span> <span
class="inserted"><ins><em>security,</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>anonymity
given by</em></ins></span> the <span class="removed"><del><strong>first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>VPN
+ apps—millions</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>users
may</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable with free software.</p>
+
+ </li>
+
+ <li><p>More than 73% of</strong></del></span> <span
class="inserted"><ins><em>unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
- privacy:</p>
+ <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span class="removed"><del><strong>most popular
Android</strong></del></span> <span class="inserted"><ins><em>research paper,
+ of some proprietary VPN</em></ins></span> apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>that track
users</em></ins></span> and <span class="removed"><del><strong>location
information</a> of</strong></del></span> <span
class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span>
+ <span class="inserted"><ins><em>privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ meant</em></ins></span> to <span class="inserted"><ins><em>track users
and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
permissions upon installation, meaning it has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers have
- confirmed this.</dd>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>read logs</em></ins></span>
+ for <span class="removed"><del><strong>granted that the usual analytics
tools are
+ legitimate, but is that valid? Software</strong></del></span> <span
class="inserted"><ins><em>other apps and also core system logs.
TigerVPN</em></ins></span> developers have <span
class="removed"><del><strong>no right</strong></del></span>
+ <span class="inserted"><ins><em>confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to the UK government if requested.</dd>
+ <dd>Sends traffic</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn.
Also, it stores detailed logs and
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
@@ -1662,7 +1658,8 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
five tracking libraries. Developers of this app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>user and displaying ads.</dd>
@@ -3745,7 +3742,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/09 17:32:22 $
+$Date: 2020/07/17 19:02:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary/po/proprietary-surveillance.de.po 9 Jul 2020 17:32:23
-0000 1.332
+++ proprietary/po/proprietary-surveillance.de.po 17 Jul 2020 19:02:14
-0000 1.333
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -568,12 +568,29 @@
"Ã.]</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
msgid ""
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"<a href=\"https://docs.microsoft.com/de-de/windows/privacy/configure-windows-"
@@ -1177,8 +1194,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary-surveillance.es.po 11 Jul 2020 10:31:47
-0000 1.52
+++ proprietary/po/proprietary-surveillance.es.po 17 Jul 2020 19:02:14
-0000 1.53
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-07-11 12:17+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -419,12 +420,29 @@
"«Completo» en la configuración predefinida</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
msgid ""
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
@@ -851,11 +869,25 @@
"\">#SpywareInTelephones</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La mayorÃa de las aplicaciones son <cite>malware</cite>, pero la aplicación
"
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary/po/proprietary-surveillance.fr.po 10 Jul 2020 11:26:36
-0000 1.514
+++ proprietary/po/proprietary-surveillance.fr.po 17 Jul 2020 19:02:15
-0000 1.515
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-07-10 13:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -412,12 +413,29 @@
"défaut le niveau de télémétrie à « Complet »</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
msgid ""
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"Le <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
@@ -847,11 +865,25 @@
"\">#SpywareInTelephones</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La plupart des applis sont des logiciels malveillants, mais l'appli de "
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary/po/proprietary-surveillance.it-diff.html 9 Jul 2020
17:32:23 -0000 1.183
+++ proprietary/po/proprietary-surveillance.it-diff.html 17 Jul 2020
19:02:15 -0000 1.184
@@ -296,8 +296,8 @@
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
- can contain sensitive information like administrator's login
+ <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+ which can contain sensitive information like administrator's login
password</a>.</p>
</li>
@@ -597,8 +597,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop</em></ins></span>
on <span class="removed"><del><strong>users</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop</em></ins></span> on
<span class="removed"><del><strong>users</a>.</p>
<p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>as well
as snooping on them itself</a>.</p>
@@ -655,32 +655,27 @@
the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
+ lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ </li>
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote
command, and users cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google
+and other companies from getting this personal information in the first
+place!</p></strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones
- to have GPS.)</p>
- </li>
-</ul>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -690,12 +685,18 @@
<ul class="blurbs">
<li id="M201910131">
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ <p>Safari occasionally</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable</strong></del></span> <span class="inserted"><ins><em>Tencent
Safe
- Browsing service</a>, to check URLs that possibly correspond to
+ unthinkable</strong></del></span> <span class="inserted"><ins><em>check
URLs that possibly correspond to
“fraudulent” websites. Since Tencent
collaborates</em></ins></span>
with <span class="removed"><del><strong>free software.</p>
@@ -968,7 +969,7 @@
href="/malware/proprietary-surveillance.html#M201508210"> they make
users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
but we condemn this no matter who does it.</p>
</li>
@@ -981,8 +982,8 @@
<li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read
call,</strong></del></span> location <span class="inserted"><ins><em>data while
in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -1062,30 +1063,30 @@
<p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>to
Motorola</a>.</p>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <p>A Motorola phone <a
+
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201302150">
<p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ the personal details</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
@@ -1140,24 +1141,14 @@
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and</strong></del></span>
- <span class="inserted"><ins><em>report even which page</em></ins></span>
the user <span class="removed"><del><strong>must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em>report even which page</em></ins></span>
the user <span class="removed"><del><strong>must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>reads at what
time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>the phone,</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1169,33 +1160,42 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
- once more</em></ins></span> how <span
class="removed"><del><strong>“getting</strong></del></span> <span
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are
supposed
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed</em></ins></span> the <span class="removed"><del><strong>app takes
effect. However,</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ once more how unsafe nonfree software can be. Tools that are supposed
to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
+ additional malware (the system itself being</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>original malware).</p></em></ins></span>
</li>
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811020">
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <p>The fact that this is used</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>repression of forbidden sharing
- makes it even more vicious.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
- <p>This illustrates that making unauthorized copies of nonfree
software</em></ins></span>
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
@@ -1515,53 +1515,34 @@
sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
- way <span class="removed"><del><strong>to access</strong></del></span>
<span class="inserted"><ins><em>and released them, apparently not realizing
that all</em></ins></span> the <span class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go to Facebook as well.</p>
+ way <span class="removed"><del><strong>to access the data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>and
released them, apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected would go to Facebook as well.</p>
- <p>That</strong></del></span>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>FBI could
listen to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1571,43 +1552,42 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
- them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>do.</p>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>apparent violation
of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This
proves</em></ins></span>
+ that the <span class="removed"><del><strong>specific sabotage method
Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>development
platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1617,24 +1597,27 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
<p>Specifically, it can collect the emails of
members</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <p><small>(It is unfortunate that these articles talk about
“free
- apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
+ difficult.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1645,248 +1628,160 @@
</div>
<ul>
- <li><p>Spyware in Skype:
+ <li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+ potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
+
+ <p><small>(It is unfortunate that these articles talk about
“free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free
software</a>.)</small></p>
+ </li>
+
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's
server</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>We think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"></em></ins></span>
- report <span class="removed"><del><strong>even which
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p>
- </li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
<span class="inserted"><ins><em>machine's “advertising ID,” so that
+ <p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them</em></ins></span> send <span
class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>whether the user has a Facebook
- account.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
+ <li>
+ <p>The</strong></del></span> <span class="inserted"><ins><em>the
app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
- <p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
- <li id="records-drivers"><p>Proprietary
software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
- source code they cannot look at.</em></ins></span> The other
- <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
- in <span class="removed"><del><strong>the car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information</em></ins></span> about <span
class="inserted"><ins><em><a
+ <li id="M201804020">
+ <p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p>
- </li>
-
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>spy on their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to
each</em></ins></span>
- other <span class="removed"><del><strong>day a woman came
up</strong></del></span> <span class="inserted"><ins><em>but
not</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see
you</strong></del></span> <span class="inserted"><ins><em>dis-service
- spy</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just
broadcasts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if the
image</strong></del></span> <span class="inserted"><ins><em>after going to a
movie</a>.</p>
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps</em></ins></span>
- is <span class="removed"><del><strong>coming from
the</strong></del></span> <span class="inserted"><ins><em>pervasive and
sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a</em></ins></span> user's <span class="removed"><del><strong>own
- computer, the TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>movements
around</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1894,10 +1789,9 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>developer's server.</p>
+ book to developer's server.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>surveillance, even if it
were</strong></del></span> <span class="inserted"><ins><em>words
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
@@ -1907,80 +1801,54 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did</em></ins></span> not <span
class="removed"><del><strong>hidden as</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the
contrary,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="inserted"><ins><em>various ways to prevent that, and
deleted</em></ins></span> these <span class="removed"><del><strong>TVs, does
not legitimize</strong></del></span> <span class="inserted"><ins><em>apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on</strong></del></span> <span class="inserted"><ins><em>snooping of these
apps.</p>
+ for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice
of</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
-
- <p>The report was</strong></del></span> <span
class="inserted"><ins><em>being
- nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="inserted"><ins><em>Google Play,
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>preventing apps from
- cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
- to <span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>inspect
executable proprietary apps to see</em></ins></span> what <span
class="removed"><del><strong>happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>they
do.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
- the source code somehow</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs</strong></del></span> <span
class="inserted"><ins><em>app developers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>clever
- enough</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>checking.</p>
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend</em></ins></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>each
other.</p>
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="inserted"><ins><em>only hope that they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that</em></ins></span> track <span
class="removed"><del><strong>you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>ultrasound from
beacons placed in stores or played</em></ins></span> by <span
class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>TV
- programs</a>.</p></em></ins></span>
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704260">
+ <li id="M201704260">
<p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="inserted"><ins><em>personal data in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
@@ -2770,57 +2638,124 @@
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ <p>Data collected by devices such as the</em></ins></span> Nest
<span class="removed"><del><strong>Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result,
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell
phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
+ paying for the subscription,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
- working order.</p>
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
@@ -2831,48 +2766,97 @@
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over the Internet</a>.</p>
+ sending usage</em></ins></span> data <span
class="removed"><del><strong>remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>back
over</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>to get the data
+ and hand</strong></del></span> <span class="inserted"><ins><em>is
air-gapped,</em></ins></span> it <span class="removed"><del><strong>over, the
state can store it.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest</strong></del></span>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user</a>.</p>
+ data about the user</a>.</p>
</li>
- <li id="M201310260">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260">
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart”
TVs</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
+ <p>Tommy Hilfiger clothing</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
+ <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>shows that laws requiring
products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the
TV</strong></del></span> will <span class="removed"><del><strong>say,
“Without your consent to tracking,</strong></del></span> <span
class="inserted"><ins><em>teach</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2882,16 +2866,22 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>online
- social media participation, Tivo can</strong></del></span> <span
class="inserted"><ins><em>an Android app <a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
@@ -2907,30 +2897,33 @@
<ul class="blurbs">
<li id="M201912171">
- <p>Most modern cars</em></ins></span> now <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>running with
- proprietary software.</p>
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
+ cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>a
junkyard the driver's personal data goes with
- them</a>.</p>
+ <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data
goes</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
<li id="M201902011">
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
@@ -3545,7 +3538,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/09 17:32:23 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- proprietary/po/proprietary-surveillance.it.po 9 Jul 2020 17:32:23
-0000 1.344
+++ proprietary/po/proprietary-surveillance.it.po 17 Jul 2020 19:02:15
-0000 1.345
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -560,8 +560,10 @@
# |
{+href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">+}
# | “Full” telemetry mode</a> allows Microsoft Windows engineers
# | to access, among other things, registry keys <a
-# | href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which
-# | can contain sensitive information like administrator's login password</a>.
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
#, fuzzy
#| msgid ""
#| "The <a href=\"https://docs.microsoft.com/en-us/windows/configuration/"
@@ -574,8 +576,9 @@
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"La <a href=\"https://docs.microsoft.com/en-us/windows/configuration/"
@@ -1152,8 +1155,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary-surveillance.ja-diff.html 9 Jul 2020
17:32:23 -0000 1.200
+++ proprietary/po/proprietary-surveillance.ja-diff.html 17 Jul 2020
19:02:15 -0000 1.201
@@ -295,8 +295,8 @@
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys <a
- href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
- can contain sensitive information like administrator's login
+
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+ which can contain sensitive information like administrator's login
password</a>.</p>
</li>
@@ -593,8 +593,8 @@
“free”—they</strong></del></span> are <span
class="removed"><del><strong>not free software. The clear way to say
“zero price”</strong></del></span> <span
class="inserted"><ins><em>malware, but
Trump's campaign app, like Modi's campaign app,</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p></strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p></em></ins></span>
<p>The article <span class="removed"><del><strong>takes for
granted</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> that <span
class="removed"><del><strong>the usual analytics tools are
@@ -690,11 +690,11 @@
</li>
<li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>Apple
devices in China to</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>Apple devices in China to</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
+ with</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
@@ -796,7 +796,7 @@
</li>
<li id="M201409220">
- <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>regularly does, <a
+ <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>get other</strong></del></span> <span
class="inserted"><ins><em>regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
@@ -820,7 +820,7 @@
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get</em></ins></span> other info too.</p>
+ get other</em></ins></span> info too.</p>
</li>
<span
class="removed"><del><strong><li><p>There</strong></del></span>
@@ -910,13 +910,13 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -1012,8 +1012,7 @@
<p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get</strong></del></span>
<span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
<p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
@@ -1022,7 +1021,8 @@
honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
+ <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1134,8 +1134,8 @@
twisted ways that they present snooping as a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The
result</em></ins></span> is
- <span class="inserted"><ins><em>often</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>legal threat demanding a lot of money.</p>
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who</em></ins></span> is <span
class="inserted"><ins><em>running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>typical
example</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
@@ -1546,20 +1546,21 @@
<ul>
<li><p>Computerized cars with nonfree software are
<a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
+ that the policies of</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>development
platform are ineffective at
preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ their programs.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
@@ -1754,12 +1755,12 @@
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of</em></ins></span> the <span class="removed"><del><strong>company already
monitors. Tivo customers are unaware they're being
watched</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied</em></ins></span> by
- <span class="removed"><del><strong>advertisers. By combining TV
viewing</strong></del></span> <span class="inserted"><ins><em>researchers were
found to snoop
- and collect</em></ins></span> information <span
class="removed"><del><strong>with online
+ <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>about its
users</a>. 40% of the apps were
+ advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>researchers were
found</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>collect
information about its users</a>. 40% of the apps were
found</em></ins></span> to <span class="removed"><del><strong>be
picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
@@ -1829,12 +1830,22 @@
could spy this way.</p>
<p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
networks</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
+ book to developer's server.</p>
+
+ <p><small>(Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>zero
price.)</small></p></em></ins></span>
+ </li>
<span class="removed"><del><strong></ul>
<!-- #SpywareAtPlay -->
@@ -1847,57 +1858,47 @@
<ul>
<li><p>Many</strong></del></span>
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
- book</em></ins></span> to <span class="inserted"><ins><em>developer's
server.</p>
-
- <p><small>(Note that this article misuses</em></ins></span>
the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.)</small></p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
<span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users</strong></del></span>
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>their
users'
- friends</strong></del></span> <span class="inserted"><ins><em>sent
them</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+ calls</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages and
emails</em></ins></span> to <span
class="inserted"><ins><em>snoopers</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>text messages</em></ins></span> and <span
class="removed"><del><strong>sites made by different
- companies.</p>
+ <p>Google did not intend to make these apps spy;
on</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>—
even</strong></del></span> <span class="inserted"><ins><em>contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering</em></ins></span> what <span
class="removed"><del><strong>their users weigh.</p>
+
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
- <p>They use this data</strong></del></span> <span
class="inserted"><ins><em>emails</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+ <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and <span class="removed"><del><strong>you can't trust
a computer with
+ a</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice of their being
+ nonfree. It also distributes its own</em></ins></span> nonfree <span
class="removed"><del><strong>operating system.</p>
+ </li>
- <p>Google did not intend</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>hunt</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
- discovering what they did. So we cannot blame Google
specifically</em></ins></span>
- for <span class="removed"><del><strong>“whales” who can be led
to spend a lot</strong></del></span> <span class="inserted"><ins><em>the
snooping</em></ins></span> of <span class="removed"><del><strong>money.
They</strong></del></span> <span class="inserted"><ins><em>these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
- nonfree. It</em></ins></span> also <span class="removed"><del><strong>use
a back door to</strong></del></span> <span
class="inserted"><ins><em>distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>apps, such as Google Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
+ <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>wide range</strong></del></span> <span
class="inserted"><ins><em>better job</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
+ to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>data
+ collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="removed"><del><strong>sites made by different
+ companies.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
+ <p>They use this data</strong></del></span> <span
class="inserted"><ins><em>study
+ the source code somehow</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ enough</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt</strong></del></span> <span class="inserted"><ins><em>outsmart the
checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
@@ -1905,20 +1906,20 @@
</li>
<li id="M201705230">
- <p>Apps for BART <a
+ <p>Apps</em></ins></span> for <span
class="removed"><del><strong>“whales” who</strong></del></span>
<span class="inserted"><ins><em>BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p>
</li>
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to <span class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by
TV
programs</a>.</p>
</li>
@@ -1931,8 +1932,9 @@
<li id="M201704190">
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
+ distributing</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
+ the app would record the names</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also</strong></del></span> <span class="inserted"><ins><em>the audio
files users listen to
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
@@ -1954,8 +1956,8 @@
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
- its search engine.</p>
+ about the users' searches that Google normally gets when
they</em></ins></span> use
+ <span class="inserted"><ins><em>its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
@@ -1968,7 +1970,7 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data to</em></ins></span> a <span
class="removed"><del><strong>back</strong></del></span> <span
class="inserted"><ins><em>Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -2270,7 +2272,7 @@
<p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend a lot of money. They also
- use a back door to</em></ins></span> manipulate the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
+ use a back</em></ins></span> door to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>manipulate the game play for specific
players.</p>
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
@@ -2971,7 +2973,7 @@
<ul class="blurbs">
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates the potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+ creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
<p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
surveillance ever. All it takes to make this potential real <a
@@ -3386,7 +3388,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/09 17:32:23 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary/po/proprietary-surveillance.ja.po 9 Jul 2020 17:32:23
-0000 1.326
+++ proprietary/po/proprietary-surveillance.ja.po 17 Jul 2020 19:02:15
-0000 1.327
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -448,8 +448,9 @@
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
@@ -871,8 +872,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary/po/proprietary-surveillance.pot 9 Jul 2020 17:32:23 -0000
1.265
+++ proprietary/po/proprietary-surveillance.pot 17 Jul 2020 19:02:15 -0000
1.266
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -347,8 +347,9 @@
"href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
"
"“Full” telemetry mode</a> allows Microsoft Windows engineers to "
"access, among other things, registry keys <a "
-"href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which can "
-"contain sensitive information like administrator's login password</a>."
+"href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
"
+"which can contain sensitive information like administrator's login "
+"password</a>."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -634,8 +635,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
"
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.610
retrieving revision 1.611
diff -u -b -r1.610 -r1.611
--- proprietary/po/proprietary-surveillance.ru.po 10 Jul 2020 07:31:58
-0000 1.610
+++ proprietary/po/proprietary-surveillance.ru.po 17 Jul 2020 19:02:15
-0000 1.611
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-09 17:25+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -408,12 +409,29 @@
"a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
msgid ""
"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
-"among other things, registry keys <a href=\"https://technet.microsoft.com/en-"
-"us/library/cc939702.aspx\">which can contain sensitive information like "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"<a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-"
@@ -836,11 +854,25 @@
"\">#SpywareInTelephones</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÐолÑÑинÑÑво пÑиложений вÑедоноÑнÑ, но
пÑиложение кампании ТÑампа, как и "
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary.de-diff.html 13 Jul 2020 10:02:36 -0000
1.163
+++ proprietary/po/proprietary.de-diff.html 17 Jul 2020 19:02:15 -0000
1.164
@@ -248,8 +248,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -327,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary/po/proprietary.de.po 13 Jul 2020 10:02:36 -0000 1.204
+++ proprietary/po/proprietary.de.po 17 Jul 2020 19:02:15 -0000 1.205
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -493,8 +493,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.es.po 15 Jul 2020 11:30:09 -0000 1.295
+++ proprietary/po/proprietary.es.po 17 Jul 2020 19:02:15 -0000 1.296
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -368,11 +369,25 @@
"induciendo asà a niños y personas influenciables a gastar dinero en el
juego."
#. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La mayorÃa de las aplicaciones son <cite>malware</cite>, pero la aplicación
"
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/proprietary.fr.po 13 Jul 2020 10:15:46 -0000 1.338
+++ proprietary/po/proprietary.fr.po 17 Jul 2020 19:02:15 -0000 1.339
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-07-13 12:15+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -365,11 +366,25 @@
"et les personnes influençables à dépenser de l'argent en jouant."
#. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"La plupart des applis sont des logiciels malveillants, mais l'appli de "
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary/po/proprietary.it-diff.html 13 Jul 2020 10:02:36 -0000
1.175
+++ proprietary/po/proprietary.it-diff.html 17 Jul 2020 19:02:15 -0000
1.176
@@ -247,8 +247,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -326,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary/po/proprietary.it.po 13 Jul 2020 10:02:36 -0000 1.213
+++ proprietary/po/proprietary.it.po 17 Jul 2020 19:02:15 -0000 1.214
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -497,8 +497,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary/po/proprietary.ja-diff.html 13 Jul 2020 10:02:36 -0000
1.179
+++ proprietary/po/proprietary.ja-diff.html 17 Jul 2020 19:02:15 -0000
1.180
@@ -245,8 +245,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -324,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary/po/proprietary.ja.po 13 Jul 2020 10:02:36 -0000 1.197
+++ proprietary/po/proprietary.ja.po 17 Jul 2020 19:02:15 -0000 1.198
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -358,8 +358,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary/po/proprietary.nl-diff.html 13 Jul 2020 10:02:36 -0000
1.176
+++ proprietary/po/proprietary.nl-diff.html 17 Jul 2020 19:02:15 -0000
1.177
@@ -247,8 +247,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -326,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary/po/proprietary.nl.po 13 Jul 2020 10:02:36 -0000 1.187
+++ proprietary/po/proprietary.nl.po 17 Jul 2020 19:02:15 -0000 1.188
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -401,8 +401,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary/po/proprietary.pl-diff.html 13 Jul 2020 10:02:36 -0000
1.193
+++ proprietary/po/proprietary.pl-diff.html 17 Jul 2020 19:02:15 -0000
1.194
@@ -245,8 +245,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -324,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary/po/proprietary.pl.po 13 Jul 2020 10:02:36 -0000 1.180
+++ proprietary/po/proprietary.pl.po 17 Jul 2020 19:02:15 -0000 1.181
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -578,8 +578,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/proprietary.pot 13 Jul 2020 10:02:36 -0000 1.177
+++ proprietary/po/proprietary.pot 17 Jul 2020 19:02:15 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -295,8 +295,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a "
-"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
-"\">especially nasty malware, helping companies snoop on users as well as "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
"
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary/po/proprietary.pt-br.po 13 Jul 2020 10:02:36 -0000 1.310
+++ proprietary/po/proprietary.pt-br.po 17 Jul 2020 19:02:15 -0000 1.311
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-06-30 08:27-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -346,11 +346,18 @@
msgstr ""
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"A maioria dos aplicativos são malware, mas o aplicativo de campanha do "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary/po/proprietary.ru.po 13 Jul 2020 11:00:39 -0000 1.372
+++ proprietary/po/proprietary.ru.po 17 Jul 2020 19:02:15 -0000 1.373
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -369,11 +370,25 @@
"игÑÑ Ð´ÐµÑÑми и впеÑаÑлиÑелÑнÑми лÑдÑми."
#. type: Content of: <div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÐолÑÑинÑÑво пÑиложений вÑедоноÑнÑ, но
пÑиложение кампании ТÑампа, как и "
Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary.tr.po 13 Jul 2020 17:32:52 -0000 1.38
+++ proprietary/po/proprietary.tr.po 17 Jul 2020 19:02:15 -0000 1.39
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-07-13 19:27+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.3\n"
@@ -360,11 +361,18 @@
"kiÅiler oyunda para harcamaya teÅvik ediliyor."
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÃoÄu uygulama kötücül yazılımdır, ancak Trump'ın kampanya
uygulaması, "
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary.zh-cn.po 15 Jul 2020 09:31:56 -0000 1.36
+++ proprietary/po/proprietary.zh-cn.po 17 Jul 2020 19:02:15 -0000 1.37
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-07-15 15:17+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-17 18:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -337,11 +338,18 @@
"æ°ï¼å
æ¤è¿æ¯å¨é¼å±å¿ç«¥åèªæ§è½åå·®ç人å¨æ¸¸æä¸è±è´¹ã"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"大å¤æ°çåºç¨é½æ¯æ¶æ软件ï¼ä½æ¯å·æ®çç«éåºç¨å Modi
çç«éåºç¨ç±»ä¼¼ï¼æ¯ <a "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary/po/proprietary.zh-tw-diff.html 13 Jul 2020 10:02:36 -0000
1.156
+++ proprietary/po/proprietary.zh-tw-diff.html 17 Jul 2020 19:02:15 -0000
1.157
@@ -248,8 +248,8 @@
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
- ">especially nasty malware, helping companies snoop on users as well
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
@@ -327,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/13 10:02:36 $
+$Date: 2020/07/17 19:02:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary/po/proprietary.zh-tw.po 13 Jul 2020 10:02:36 -0000 1.167
+++ proprietary/po/proprietary.zh-tw.po 17 Jul 2020 19:02:15 -0000 1.168
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-13 09:55+0000\n"
+"POT-Creation-Date: 2020-07-17 18:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -471,8 +471,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/pt-br.po 13 Jul 2020 10:02:36 -0000 1.259
+++ proprietary/po/pt-br.po 17 Jul 2020 19:02:15 -0000 1.260
@@ -5598,11 +5598,18 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"A maioria dos aplicativos são malware, mas o aplicativo de campanha do "
@@ -9071,6 +9078,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -9816,6 +9834,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "A maioria dos aplicativos são malware, mas o aplicativo de campanha do "
+#~ "Trump, assim como o aplicativo de campanha do Modi, é um <a href="
+#~ "\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-"
+#~ "invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">malware especialmente nojento, ajudando empresas a bisbilhotar "
+#~ "usuários assim como a eles mesmos</a>."
+
#, fuzzy
#~| msgid ""
#~| "As of January, 2020, the pages in this directory list around 450 "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -b -r1.434 -r1.435
--- proprietary/po/ru.po 13 Jul 2020 11:30:33 -0000 1.434
+++ proprietary/po/ru.po 17 Jul 2020 19:02:15 -0000 1.435
@@ -6929,11 +6929,25 @@
"позволÑÐµÑ Ð¿ÑевÑаÑаÑÑ Ð¸Ñ
в ÑÑаÑнÑе
подÑлÑÑиваÑÑие ÑÑÑÑойÑÑва."
#. type: Content of: <div><div><ul><li><p>
+# | Most apps are malware, but Trump's campaign app, like Modi's campaign app,
+# | is <a
+# |
[-href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+# | \">especially-]
+# |
{+href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\">
+# | especially+} nasty malware, helping companies snoop on users as well as
+# | snooping on them itself</a>.
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÐолÑÑинÑÑво пÑиложений вÑедоноÑнÑ, но
пÑиложение кампании ТÑампа, как и "
@@ -10987,6 +11001,39 @@
"запиÑÑÐ²Ð°ÐµÑ Ð²Ñе нажаÑÐ¸Ñ Ð½Ð° клавиÑи</a>."
#. type: Content of: <div><div><ul><li><p>
+# | The <a
+# |
href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level\">
+# | “Full” telemetry mode</a> allows Microsoft Windows engineers
+# | to access, among other things, registry keys <a
+# |
[-href=\"https://technet.microsoft.com/en-us/library/cc939702.aspx\">which-]
+# |
{+href=\"https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)\">
+# | which+} can contain sensitive information like administrator's login
+# | password</a>.
+#, fuzzy
+#| msgid ""
+#| "The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+#| "windows-diagnostic-data-in-your-organization#full-level\"> “"
+#| "Full” telemetry mode</a> allows Microsoft Windows engineers to "
+#| "access, among other things, registry keys <a href=\"https://technet."
+#| "microsoft.com/en-us/library/cc939702.aspx\">which can contain sensitive "
+#| "information like administrator's login password</a>."
+msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+"<a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-windows-"
+"diagnostic-data-in-your-organization#full-level\">“ÐолнÑй”
Ñежим "
+"ÑелемеÑÑии</a> позволÑÐµÑ Ð¸Ð½Ð¶ÐµÐ½ÐµÑам Microsoft
Windows полÑÑиÑÑ Ð´Ð¾ÑÑÑп, кÑоме "
+"пÑоÑего, к клÑÑам ÑееÑÑÑа, <a
href=\"https://technet.microsoft.com/en-us/"
+"library/cc939702.aspx\">коÑоÑÑе могÑÑ ÑодеÑжаÑÑ
ÑакÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑÑ "
+"инÑоÑмаÑиÑ, как паÑÐ¾Ð»Ñ ÑÑеÑной запиÑи
админиÑÑÑаÑоÑа</a>."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
@@ -11829,6 +11876,20 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "ÐолÑÑинÑÑво пÑиложений вÑедоноÑнÑ, но
пÑиложение кампании ТÑампа, как и "
+#~ "пÑиложение кампании Ðоди, <a
href=\"https://www.technologyreview."
+#~ "com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-"
+#~ "surveillance-tool-of-extraordinary-scope/ \">оÑобенно
ÑквеÑно: оно и "
+#~ "Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñм подглÑдÑваÑÑ Ð·Ð°
полÑзоваÑелÑми, и подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° ними "
+#~ "Ñамо</a>."
+
+#~ msgid ""
#~ "“Bossware” is malware that bosses <a href=\"https://www.eff."
#~ "org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"
#~ "\"> coerce workers into installing in their own computers</a>, so the "
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/tr.po 13 Jul 2020 10:02:36 -0000 1.33
+++ proprietary/po/tr.po 17 Jul 2020 19:02:15 -0000 1.34
@@ -4867,11 +4867,18 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"ÃoÄu uygulama kötücül yazılımdır, ancak Trump'ın kampanya
uygulaması, "
@@ -8020,6 +8027,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -8709,6 +8727,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "ÃoÄu uygulama kötücül yazılımdır, ancak Trump'ın kampanya
uygulaması, "
+#~ "Modi'nin kampanya uygulaması gibi, <a
href=\"https://www.technologyreview."
+#~ "com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-"
+#~ "surveillance-tool-of-extraordinary-scope/ \">özellikle nahoŠkötücül "
+#~ "yazılımdır, hem Åirketlerin hem de uygulama sahiplerinin
kullanıcıları "
+#~ "gizlice gözetlemesine yardımcı oluyor</a>."
+
#, fuzzy
#~| msgid ""
#~| "“Bossware” is malware that bosses <a href=\"https://www.eff."
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/zh-cn.po 15 Jul 2020 08:00:04 -0000 1.29
+++ proprietary/po/zh-cn.po 17 Jul 2020 19:02:15 -0000 1.30
@@ -4802,17 +4802,24 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#| "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#| "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#| "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#| "on users as well as snooping on them itself</a>."
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
"大å¤æ°çåºç¨é½æ¯æ¶æ软件ï¼ä½æ¯å·æ®çç«éåºç¨å Modi
çç«éåºç¨ç±»ä¼¼ï¼æ¯ <a "
"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ \">"
-"å°¤å
¶ä½å£çæ¶æ软件ï¼å®æ¬èº«å°±å¨å¸®å©ç§ä¼å
æ¢ç¨æ·ä¹å¨å
æ¢ä»ä»¬èªå·±ã"
+"å°¤å
¶ä½å£çæ¶æ软件ï¼å®æ¬èº«å°±å¨å¸®å©ç§ä¼å
æ¢ç¨æ·ä¹å¨å
æ¢ä»ä»¬èªå·±</a>ã"
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -7804,6 +7811,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
@@ -8535,6 +8553,18 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
+#~ msgid ""
+#~ "Most apps are malware, but Trump's campaign app, like Modi's campaign "
+#~ "app, is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/"
+#~ "trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-"
+#~ "extraordinary-scope/ \">especially nasty malware, helping companies snoop "
+#~ "on users as well as snooping on them itself</a>."
+#~ msgstr ""
+#~ "大å¤æ°çåºç¨é½æ¯æ¶æ软件ï¼ä½æ¯å·æ®çç«éåºç¨å Modi
çç«éåºç¨ç±»ä¼¼ï¼æ¯ <a "
+#~ "href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+#~ "hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+#~ "\">å°¤å
¶ä½å£çæ¶æ软件ï¼å®æ¬èº«å°±å¨å¸®å©ç§ä¼å
æ¢ç¨æ·ä¹å¨å
æ¢ä»ä»¬èªå·±ã"
+
#, fuzzy
#~| msgid ""
#~| "As of January, 2020, the pages in this directory list around 450 "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/zh-tw.po 13 Jul 2020 10:02:36 -0000 1.196
+++ proprietary/po/zh-tw.po 17 Jul 2020 19:02:15 -0000 1.197
@@ -4878,8 +4878,8 @@
msgid ""
"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
-"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
-"\">especially nasty malware, helping companies snoop on users as well as "
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/\"> "
+"especially nasty malware, helping companies snoop on users as well as "
"snooping on them itself</a>."
msgstr ""
@@ -8068,6 +8068,17 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
+"windows-diagnostic-data-in-your-organization#full-level\"> “"
+"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
+"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
+"administrator's login password</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20150905163414/http://www.pocket-lint."
"com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-"
"when-windows-10-is-sleeping\"> Intel devices will be able to listen for "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www distros/po/free-distros.ar.po distros/po/fr...,
GNUN <=