[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 16 Oct 2020 11:02:49 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/10/16 11:02:48
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.385&r2=1.386
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.545&r2=1.546
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.358&r2=1.359
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.635&r2=1.636
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.480&r2=1.481
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.218&r2=1.219
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- de.po 16 Oct 2020 14:33:56 -0000 1.218
+++ de.po 16 Oct 2020 15:02:45 -0000 1.219
@@ -12255,8 +12255,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- es.po 16 Oct 2020 14:33:56 -0000 1.312
+++ es.po 16 Oct 2020 15:02:45 -0000 1.313
@@ -12162,8 +12162,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.385
retrieving revision 1.386
diff -u -b -r1.385 -r1.386
--- fr.po 16 Oct 2020 14:33:56 -0000 1.385
+++ fr.po 16 Oct 2020 15:02:45 -0000 1.386
@@ -10698,8 +10698,9 @@
# | people (specially children's) privacy. In addition, they have a lot of
# | security flaws. <a
# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
#, fuzzy
#| msgid ""
#| "Internet-enabled watches with proprietary software are malware, violating "
@@ -10711,8 +10712,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
"malfaisants, car elles violent la vie privée des gens et en particulier des "
@@ -12166,6 +12167,29 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Internet-enabled watches with proprietary software are malware, "
+#~| "violating people (specially children's) privacy. In addition, they have "
+#~| "a lot of security flaws. <a href=\"https://www.wired.com/story/kid-"
+#~| "smartwatch-security-vulnerabilities/\">They permit access by security "
+#~| "breakers</a> and unauthorized people, and can send messages from "
+#~| "unauthorized devices."
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\">They permit access by security breakers</a> "
+#~ "and unauthorized people."
+#~ msgstr ""
+#~ "Les montres connectées utilisant du logiciel privateur sont des objets "
+#~ "malfaisants, car elles violent la vie privée des gens et en particulier "
+#~ "des enfants. De plus, elles ont un grand nombre de vulnérabilités. <a "
+#~ "href=\"https://www.wired.com/story/kid-smartwatch-security-"
+#~ "vulnerabilities/\">Les briseurs de sécurité y ont accès</a> ainsi que
des "
+#~ "personnes non autorisées, et elles peuvent communiquer avec des appareils
"
+#~ "non autorisés."
+
#~ msgid ""
#~ "Internet-enabled watches with proprietary software are malware, violating "
#~ "people (specially children's) privacy. In addition, they have a lot of "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- it.po 16 Oct 2020 14:33:56 -0000 1.218
+++ it.po 16 Oct 2020 15:02:45 -0000 1.219
@@ -11489,8 +11489,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- ja.po 16 Oct 2020 14:33:56 -0000 1.226
+++ ja.po 16 Oct 2020 15:02:45 -0000 1.227
@@ -8956,8 +8956,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- nl.po 16 Oct 2020 14:33:56 -0000 1.219
+++ nl.po 16 Oct 2020 15:02:45 -0000 1.220
@@ -8306,8 +8306,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- pl.po 16 Oct 2020 14:33:56 -0000 1.218
+++ pl.po 16 Oct 2020 15:02:45 -0000 1.219
@@ -7804,8 +7804,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- pot 16 Oct 2020 14:33:57 -0000 1.217
+++ pot 16 Oct 2020 15:02:45 -0000 1.218
@@ -7132,8 +7132,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-surveillance.de-diff.html 16 Oct 2020 14:33:57 -0000
1.132
+++ proprietary-surveillance.de-diff.html 16 Oct 2020 15:02:45 -0000
1.133
@@ -2921,22 +2921,22 @@
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car
remotely,</strong></del></span> <span class="inserted"><ins><em>present, but
in</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
@@ -2980,7 +2980,7 @@
store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
+ easier for Amazon. And</em></ins></span> if <span
class="removed"><del><strong>the state orders it</strong></del></span> <span
class="inserted"><ins><em>some government such as China or the US
told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
@@ -3046,9 +3046,7 @@
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
@@ -3056,13 +3054,7 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
+ <p>This will teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3074,27 +3066,36 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws.</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just
broadcasts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a></em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>unauthorized people.</p>
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit security brekaers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+
+ <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>those people/devices can use</em></ins></span> the
<span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>watch to send
messages which can be dangerous for people's privacy.</p>
- <p>Because of</em></ins></span> the <span
class="removed"><del><strong>image is coming</strong></del></span> <span
class="inserted"><ins><em>security flaws, the watch can be
accessed</em></ins></span> from <span class="inserted"><ins><em>unauthorized
people/devices and those people/devices can use</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>watch to
send messages which can be dangerous for people's privacy.</p>
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>word “<a
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
-
- <p>The article says this is a back door, but that could
be</em></ins></span> a <span class="removed"><del><strong>way to
- disable the surveillance, even if it were not hidden
as</strong></del></span>
- <span class="inserted"><ins><em>misunderstanding.
However,</em></ins></span> it <span class="removed"><del><strong>was in
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="inserted"><ins><em>connects to an unidentified site in
China</a>.</p>
+
+ <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence
of</strong></del></span> a <span class="removed"><del><strong>way to
+ disable the surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>back door, but that
could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>was in
these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
</li>
@@ -3845,7 +3846,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary-surveillance.de.po 16 Oct 2020 14:33:57 -0000 1.346
+++ proprietary-surveillance.de.po 16 Oct 2020 15:02:46 -0000 1.347
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4783,8 +4783,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-surveillance.es.po 16 Oct 2020 14:33:57 -0000 1.86
+++ proprietary-surveillance.es.po 16 Oct 2020 15:02:46 -0000 1.87
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-10-08 10:33+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -4250,8 +4250,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.545
retrieving revision 1.546
diff -u -b -r1.545 -r1.546
--- proprietary-surveillance.fr.po 16 Oct 2020 14:33:57 -0000 1.545
+++ proprietary-surveillance.fr.po 16 Oct 2020 15:02:46 -0000 1.546
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-10-16 14:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -4257,8 +4257,9 @@
# | people (specially children's) privacy. In addition, they have a lot of
# | security flaws. <a
# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
#, fuzzy
#| msgid ""
#| "Internet-enabled watches with proprietary software are malware, violating "
@@ -4270,8 +4271,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
"malfaisants, car elles violent la vie privée des gens et en particulier des "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.it-diff.html 16 Oct 2020 14:33:57 -0000
1.198
+++ proprietary-surveillance.it-diff.html 16 Oct 2020 15:02:46 -0000
1.199
@@ -2938,7 +2938,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -3634,7 +3634,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.358
retrieving revision 1.359
diff -u -b -r1.358 -r1.359
--- proprietary-surveillance.it.po 16 Oct 2020 14:33:57 -0000 1.358
+++ proprietary-surveillance.it.po 16 Oct 2020 15:02:46 -0000 1.359
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4499,8 +4499,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary-surveillance.ja-diff.html 16 Oct 2020 14:33:57 -0000
1.216
+++ proprietary-surveillance.ja-diff.html 16 Oct 2020 15:02:46 -0000
1.217
@@ -2552,11 +2552,9 @@
way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
<p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google
service.</p></em></ins></span>
+ you.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -2564,87 +2562,91 @@
</div>
<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that</em></ins></span> the user <span
class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>wants to send to some Google
service.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Adobe</strong></del></span>
<span class="inserted"><ins><em><li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
+ recordings</em></ins></span> made <span
class="removed"><del><strong>“Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>without
a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>e-reader used</strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>, where
they can be accessed</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span class="inserted"><ins><em>advertising companies and government
agencies. In other words,
+ deleting the collected information doesn't cancel the
wrong</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
+</ul>
- <li><p>Spyware in many e-readers—not</strong></del></span>
<span class="inserted"><ins><em>other servers</a>, where they can be
accessed by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree
software</strong></del></span>
+ <span class="inserted"><ins><em>collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not</em></ins></span> only <span
class="inserted"><ins><em>in</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>present, but in the past (and, who knows,
+ the devices are tethered to. Moreover, they</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>made available to
+ Alexa. As a result, Amazon</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the present, but in the past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ voice assistants</em></ins></span> do <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
- <p>A fraction of the Alexa service staff</em></ins></span> even
<span class="removed"><del><strong>which page</strong></del></span> <span
class="inserted"><ins><em>has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span
class="inserted"><ins><em>access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>client
program is nonfree, and data processing is done
- “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
- the <span class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing
way</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”:</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
- tell you how and where</em></ins></span> it's
- <span class="removed"><del><strong>needed</strong></del></span> <span
class="inserted"><ins><em>done”), users have no way</em></ins></span>
- to <span class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>know what happens to
the recordings unless human eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have</em></ins></span> no
<span class="removed"><del><strong>authentication when
+ accessed through</strong></del></span> <span class="inserted"><ins><em>way
+ to know what happens to</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>recordings unless
human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
- effectively
- anyone</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+ communicates with HP servers</a> to make sure the user is still
paying</em></ins></span> for
<span class="removed"><del><strong>authentication, you
couldn't</strong></del></span> <span class="inserted"><ins><em>the
subscription, and hasn't printed more pages than were
paid for.</p>
@@ -2740,18 +2742,18 @@
<p>Internet-enabled watches with</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span>
are <span class="removed"><del><strong>an
intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>malware, violating people (specially children's)
- privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>security flaws. <a
+ privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a></em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>unauthorized people.</p>
+ permit security brekaers (and unauthorized people) to
access</a></em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>watch.</p>
- <p>Because of</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>security flaws,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <p>Because of</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>watch can be accessed from unauthorized
people/devices and those people/devices can use</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>send
messages which can be dangerous for people's privacy.</p>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>security flaws,</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>watch can be
accessed from unauthorized people/devices</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>those people/devices can use</em></ins></span> the
<span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>watch to send
messages which can be dangerous for people's privacy.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>word “<a
+ <p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3453,7 +3455,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary-surveillance.ja.po 16 Oct 2020 14:33:57 -0000 1.340
+++ proprietary-surveillance.ja.po 16 Oct 2020 15:02:46 -0000 1.341
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3558,8 +3558,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary-surveillance.pot 16 Oct 2020 14:33:57 -0000 1.279
+++ proprietary-surveillance.pot 16 Oct 2020 15:02:46 -0000 1.280
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2868,7 +2868,7 @@
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a "
"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
-"permit access by security breakers</a> and unauthorized people."
+"permit security brekaers (and unauthorized people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.635
retrieving revision 1.636
diff -u -b -r1.635 -r1.636
--- proprietary-surveillance.ru.po 16 Oct 2020 14:33:57 -0000 1.635
+++ proprietary-surveillance.ru.po 16 Oct 2020 15:02:46 -0000 1.636
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -4213,8 +4213,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.de-diff.html 16 Oct 2020 14:33:57 -0000 1.181
+++ proprietary.de-diff.html 16 Oct 2020 15:02:46 -0000 1.182
@@ -217,7 +217,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -319,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary.de.po 16 Oct 2020 14:33:57 -0000 1.221
+++ proprietary.de.po 16 Oct 2020 15:02:46 -0000 1.222
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -458,8 +458,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary.es.po 16 Oct 2020 14:33:57 -0000 1.326
+++ proprietary.es.po 16 Oct 2020 15:02:47 -0000 1.327
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -316,8 +316,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- proprietary.fr.po 16 Oct 2020 14:33:57 -0000 1.368
+++ proprietary.fr.po 16 Oct 2020 15:02:47 -0000 1.369
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-10-16 14:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -312,8 +312,9 @@
# | people (specially children's) privacy. In addition, they have a lot of
# | security flaws. <a
# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit access by security breakers</a> and unauthorized [-people, and can
-# | send messages from unauthorized devices.-] {+people.+}
+# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | unauthorized [-people, and can send messages from unauthorized devices.-]
+# | {+people) to access</a> the watch.+}
#, fuzzy
#| msgid ""
#| "Internet-enabled watches with proprietary software are malware, violating "
@@ -325,8 +326,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
"malfaisants, car elles violent la vie privée des gens et en particulier des "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary.it-diff.html 16 Oct 2020 14:33:57 -0000 1.193
+++ proprietary.it-diff.html 16 Oct 2020 15:02:47 -0000 1.194
@@ -216,7 +216,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -318,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.it.po 16 Oct 2020 14:33:57 -0000 1.230
+++ proprietary.it.po 16 Oct 2020 15:02:47 -0000 1.231
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -462,8 +462,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.ja-diff.html 16 Oct 2020 14:33:57 -0000 1.198
+++ proprietary.ja-diff.html 16 Oct 2020 15:02:47 -0000 1.199
@@ -214,7 +214,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary.ja.po 16 Oct 2020 14:33:57 -0000 1.214
+++ proprietary.ja.po 16 Oct 2020 15:02:47 -0000 1.215
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -323,8 +323,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.nl-diff.html 16 Oct 2020 14:33:57 -0000 1.194
+++ proprietary.nl-diff.html 16 Oct 2020 15:02:47 -0000 1.195
@@ -216,7 +216,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -318,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:57 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary.nl.po 16 Oct 2020 14:33:58 -0000 1.204
+++ proprietary.nl.po 16 Oct 2020 15:02:47 -0000 1.205
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -366,8 +366,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- proprietary.pl-diff.html 16 Oct 2020 14:33:58 -0000 1.211
+++ proprietary.pl-diff.html 16 Oct 2020 15:02:47 -0000 1.212
@@ -214,7 +214,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary.pl.po 16 Oct 2020 14:33:58 -0000 1.197
+++ proprietary.pl.po 16 Oct 2020 15:02:47 -0000 1.198
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -543,8 +543,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.pot 16 Oct 2020 14:33:58 -0000 1.194
+++ proprietary.pot 16 Oct 2020 15:02:47 -0000 1.195
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -261,7 +261,7 @@
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a "
"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
-"permit access by security breakers</a> and unauthorized people."
+"permit security brekaers (and unauthorized people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary.pt-br-diff.html 16 Oct 2020 14:33:58 -0000 1.3
+++ proprietary.pt-br-diff.html 16 Oct 2020 15:02:47 -0000 1.4
@@ -200,15 +200,15 @@
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>,
so</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
-
- <p>Because of</em></ins></span> the
+ permit security brekaers (and unauthorized people) to
access</a></em></ins></span> the
<span class="removed"><del><strong>bosses can spy on them.</p>
- <p>This shows why requiring</strong></del></span> <span
class="inserted"><ins><em>security flaws,</em></ins></span> the <span
class="removed"><del><strong>user's “consent” is not
+ <p>This shows why requiring</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
+
+ <p>Because of</em></ins></span> the <span
class="removed"><del><strong>user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
- to contagious disease that</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> can be <span
class="removed"><del><strong>fatal. Software like this should
+ to contagious disease that</strong></del></span> <span
class="inserted"><ins><em>security flaws, the watch</em></ins></span> can be
<span class="removed"><del><strong>fatal. Software like this should
be illegal</strong></del></span> <span class="inserted"><ins><em>accessed
from unauthorized people/devices</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should</strong></del></span>
<span class="inserted"><ins><em>those people/devices can use the watch to send
messages which can</em></ins></span> be <span
class="removed"><del><strong>prosecuted</strong></del></span> <span
class="inserted"><ins><em>dangerous</em></ins></span> for <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>people's privacy.</p>
<p><small>(Note that this article misuses the word “<a
@@ -331,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary.pt-br.po 16 Oct 2020 14:33:58 -0000 1.329
+++ proprietary.pt-br.po 16 Oct 2020 15:02:47 -0000 1.330
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -314,8 +314,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary.ru.po 16 Oct 2020 14:33:58 -0000 1.402
+++ proprietary.ru.po 16 Oct 2020 15:02:47 -0000 1.403
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -316,8 +316,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.tr.po 16 Oct 2020 14:33:58 -0000 1.61
+++ proprietary.tr.po 16 Oct 2020 15:02:47 -0000 1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-10-07 23:09+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -310,8 +310,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-cn.po 16 Oct 2020 14:33:58 -0000 1.67
+++ proprietary.zh-cn.po 16 Oct 2020 15:02:47 -0000 1.68
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-10-10 13:07+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -292,8 +292,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.zh-tw-diff.html 16 Oct 2020 14:33:58 -0000 1.174
+++ proprietary.zh-tw-diff.html 16 Oct 2020 15:02:47 -0000 1.175
@@ -217,7 +217,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit access by security breakers</a> and unauthorized
people.</p>
+ permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
<p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
@@ -319,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 14:33:58 $
+$Date: 2020/10/16 15:02:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary.zh-tw.po 16 Oct 2020 14:33:58 -0000 1.184
+++ proprietary.zh-tw.po 16 Oct 2020 15:02:47 -0000 1.185
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:26+0000\n"
+"POT-Creation-Date: 2020-10-16 14:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -436,8 +436,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- pt-br.po 16 Oct 2020 14:33:58 -0000 1.282
+++ pt-br.po 16 Oct 2020 15:02:47 -0000 1.283
@@ -8744,8 +8744,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.480
retrieving revision 1.481
diff -u -b -r1.480 -r1.481
--- ru.po 16 Oct 2020 14:33:58 -0000 1.480
+++ ru.po 16 Oct 2020 15:02:47 -0000 1.481
@@ -10636,8 +10636,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- tr.po 16 Oct 2020 14:33:58 -0000 1.60
+++ tr.po 16 Oct 2020 15:02:47 -0000 1.61
@@ -7759,8 +7759,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- zh-cn.po 16 Oct 2020 14:33:58 -0000 1.57
+++ zh-cn.po 16 Oct 2020 15:02:47 -0000 1.58
@@ -7532,8 +7532,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- zh-tw.po 16 Oct 2020 14:33:58 -0000 1.218
+++ zh-tw.po 16 Oct 2020 15:02:47 -0000 1.219
@@ -7693,8 +7693,8 @@
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit access by security breakers</a> and "
-"unauthorized people."
+"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>