[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 16 Oct 2020 14:30:50 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/10/16 14:30:49
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.546&r2=1.547
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.359&r2=1.360
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.636&r2=1.637
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.369&r2=1.370
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.403&r2=1.404
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.481&r2=1.482
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.219&r2=1.220
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- de.po 16 Oct 2020 15:02:45 -0000 1.219
+++ de.po 16 Oct 2020 18:30:45 -0000 1.220
@@ -12254,16 +12254,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- es.po 16 Oct 2020 15:02:45 -0000 1.313
+++ es.po 16 Oct 2020 18:30:45 -0000 1.314
@@ -12161,16 +12161,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- fr.po 16 Oct 2020 15:02:45 -0000 1.386
+++ fr.po 16 Oct 2020 18:30:45 -0000 1.387
@@ -10696,9 +10696,10 @@
#. type: Content of: <div><ul><li><p>
# | Internet-enabled watches with proprietary software are malware, violating
# | people (specially children's) privacy. In addition, they have a lot of
-# | security flaws. <a
-# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# |
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They-]
+# |
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
# | unauthorized [-people, and can send messages from unauthorized devices.-]
# | {+people) to access</a> the watch.+}
#, fuzzy
@@ -10711,8 +10712,8 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -10724,9 +10725,9 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -12179,6 +12180,29 @@
#~ "Internet-enabled watches with proprietary software are malware, violating "
#~ "people (specially children's) privacy. In addition, they have a lot of "
#~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\">They permit security brekaers (and "
+#~ "unauthorized people) to access</a> the watch."
+#~ msgstr ""
+#~ "Les montres connectées utilisant du logiciel privateur sont des objets "
+#~ "malfaisants, car elles violent la vie privée des gens et en particulier "
+#~ "des enfants. De plus, elles ont un grand nombre de vulnérabilités. <a "
+#~ "href=\"https://www.wired.com/story/kid-smartwatch-security-"
+#~ "vulnerabilities/\">Les briseurs de sécurité y ont accès</a> ainsi que
des "
+#~ "personnes non autorisées, et elles peuvent communiquer avec des appareils
"
+#~ "non autorisés."
+
+#, fuzzy
+#~| msgid ""
+#~| "Internet-enabled watches with proprietary software are malware, "
+#~| "violating people (specially children's) privacy. In addition, they have "
+#~| "a lot of security flaws. <a href=\"https://www.wired.com/story/kid-"
+#~| "smartwatch-security-vulnerabilities/\">They permit access by security "
+#~| "breakers</a> and unauthorized people, and can send messages from "
+#~| "unauthorized devices."
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
#~ "security-vulnerabilities/\">They permit access by security breakers</a> "
#~ "and unauthorized people."
#~ msgstr ""
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- it.po 16 Oct 2020 15:02:45 -0000 1.219
+++ it.po 16 Oct 2020 18:30:45 -0000 1.220
@@ -11488,16 +11488,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- ja.po 16 Oct 2020 15:02:45 -0000 1.227
+++ ja.po 16 Oct 2020 18:30:46 -0000 1.228
@@ -8955,16 +8955,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- nl.po 16 Oct 2020 15:02:45 -0000 1.220
+++ nl.po 16 Oct 2020 18:30:46 -0000 1.221
@@ -8305,16 +8305,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- pl.po 16 Oct 2020 15:02:45 -0000 1.219
+++ pl.po 16 Oct 2020 18:30:46 -0000 1.220
@@ -7803,16 +7803,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- pot 16 Oct 2020 15:02:45 -0000 1.218
+++ pot 16 Oct 2020 18:30:46 -0000 1.219
@@ -7131,16 +7131,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.de-diff.html 16 Oct 2020 15:02:45 -0000
1.133
+++ proprietary-surveillance.de-diff.html 16 Oct 2020 18:30:46 -0000
1.134
@@ -2713,38 +2713,69 @@
software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil</em></ins></span> and <span class="removed"><del><strong>spyware
via BIOS</a> on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>monitor staff
working at home</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>program
reports
- whether you are “active,” that is in effect</em></ins></span>
a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>malicious
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
<p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>taking over
ADT</a>. Google sent out a software
- update to its speaker devices using their back door</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
+ out prematurely</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
on <span class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>accident and Google
was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
<p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>their</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>devices
implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also</em></ins></span> used <span
class="removed"><del><strong>did</strong></del></span> <span
class="inserted"><ins><em>by their
+ manufacturers for snooping.</p>
+ </li>
+
+ <li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is</em></ins></span> not <span class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>supposed to listen</a>. Thus, when one of
Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>thousand
confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong>not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>computers</a>, so the
- bosses can spy</em></ins></span> on <span class="removed"><del><strong>top
under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>no
+ way</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2758,19 +2789,18 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>see or control what</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
- <p>This shows why requiring the user's “consent” is not
- an adequate basis for protecting digital privacy. The
boss</em></ins></span> can <span class="removed"><del><strong>collect the
emails of members of Parliament</strong></del></span> <span
class="inserted"><ins><em>coerce
- most workers into consenting to almost anything, even probable exposure
- to contagious disease that can be fatal. Software like</em></ins></span>
this <span class="removed"><del><strong>way, because they
pass</strong></del></span> <span class="inserted"><ins><em>should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -2784,23 +2814,23 @@
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
Microsoft changed Skype
<a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
+ specifically</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201911190">
- <p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2812,42 +2842,14 @@
<ul>
<li>
- <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>the household
- through connected surveillance devices.</p>
-
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can
communicate</strong></del></span> <span class="inserted"><ins><em>the devices
implemented proper
- security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>it,</strong></del></span> <span
class="inserted"><ins><em>proprietary
- software lack this. Of course, they are also used by their
- manufacturers for snooping.</p>
- </li>
-
- <li id="M201907210">
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it</em></ins></span> is <span class="inserted"><ins><em>not supposed
to listen</a>. Thus, when one of Google's
- subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
-
- <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>no
- way to see or control what it records or sends.</p>
-
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
- </li>
-
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
+ <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>Amazon's servers, which store it indefinitely.
Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ even</em></ins></span> if <span class="removed"><del><strong>its
manufacturer can communicate with it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers,</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
the <span class="removed"><del><strong>manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>data
remain</em></ins></span> on <span class="inserted"><ins><em>other
servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting</em></ins></span> the <span class="removed"><del><strong>fact
@@ -2916,27 +2918,27 @@
<p>That's easy to do because the system has no authentication when
accessed through the modem. However, even if it asked for
authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>result,
Amazon</em></ins></span> has <span class="removed"><del><strong>no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
- at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
+ access. The software in the car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
@@ -2980,7 +2982,7 @@
store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="removed"><del><strong>the state orders it</strong></del></span> <span
class="inserted"><ins><em>some government such as China or the US
+ easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
@@ -3046,7 +3048,9 @@
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
@@ -3054,7 +3058,13 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3066,36 +3076,27 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
-
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>those people/devices can use</em></ins></span> the
<span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>watch to send
messages which can be dangerous for people's privacy.</p>
+ privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
+ computer,</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>child.</p>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
+ <p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="inserted"><ins><em>connects to an unidentified site in
China</a>.</p>
-
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence
of</strong></del></span> a <span class="removed"><del><strong>way to
- disable the surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>back door, but that
could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>was in
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+
+ <p>The article says this is a back door, but that could
be</em></ins></span> a <span class="removed"><del><strong>way to
+ disable the surveillance, even if it were not hidden
as</strong></del></span>
+ <span class="inserted"><ins><em>misunderstanding.
However,</em></ins></span> it <span class="removed"><del><strong>was in
these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
</li>
@@ -3846,7 +3847,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:45 $
+$Date: 2020/10/16 18:30:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary-surveillance.de.po 16 Oct 2020 15:02:46 -0000 1.347
+++ proprietary-surveillance.de.po 16 Oct 2020 18:30:46 -0000 1.348
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4782,16 +4782,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.es.po 16 Oct 2020 15:02:46 -0000 1.87
+++ proprietary-surveillance.es.po 16 Oct 2020 18:30:46 -0000 1.88
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-10-08 10:33+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -4249,16 +4249,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.546
retrieving revision 1.547
diff -u -b -r1.546 -r1.547
--- proprietary-surveillance.fr.po 16 Oct 2020 15:02:46 -0000 1.546
+++ proprietary-surveillance.fr.po 16 Oct 2020 18:30:46 -0000 1.547
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-10-16 14:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -4255,9 +4255,10 @@
#. type: Content of: <div><div><ul><li><p>
# | Internet-enabled watches with proprietary software are malware, violating
# | people (specially children's) privacy. In addition, they have a lot of
-# | security flaws. <a
-# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# |
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They-]
+# |
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
# | unauthorized [-people, and can send messages from unauthorized devices.-]
# | {+people) to access</a> the watch.+}
#, fuzzy
@@ -4270,8 +4271,8 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -4283,9 +4284,9 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary-surveillance.it-diff.html 16 Oct 2020 15:02:46 -0000
1.199
+++ proprietary-surveillance.it-diff.html 16 Oct 2020 18:30:46 -0000
1.200
@@ -2936,11 +2936,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -3634,7 +3634,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- proprietary-surveillance.it.po 16 Oct 2020 15:02:46 -0000 1.359
+++ proprietary-surveillance.it.po 16 Oct 2020 18:30:47 -0000 1.360
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4498,16 +4498,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.ja-diff.html 16 Oct 2020 15:02:46 -0000
1.217
+++ proprietary-surveillance.ja-diff.html 16 Oct 2020 18:30:47 -0000
1.218
@@ -2342,17 +2342,17 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
@@ -2384,15 +2384,10 @@
user was.</p>
<p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span>
+puts</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
to</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
<li id="M201702280">
@@ -2415,7 +2410,12 @@
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
toys themselves.</p>
</li>
@@ -2552,9 +2552,11 @@
way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
<p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -2562,91 +2564,84 @@
</div>
<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that</em></ins></span> the user <span
class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>wants to send to some Google
service.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>Adobe</strong></del></span>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em><li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings</em></ins></span> made <span
class="removed"><del><strong>“Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>without
a legitimate prompt), and sends
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>e-reader used</strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>, where
they can be accessed</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span class="inserted"><ins><em>advertising companies and government
agencies. In other words,
- deleting the collected information doesn't cancel the
wrong</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
</li>
-</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span>
- <span class="inserted"><ins><em>collecting it.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>user
reads</strong></del></span> <span class="inserted"><ins><em>collected
information doesn't cancel the wrong of
+ collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users'
life</em></ins></span>
+ at <span class="removed"><del><strong>what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>home, not only in the present, but in the past (and,
who knows,
+ in the future too?)</p></em></ins></span>
</li>
- <li><p>The Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>made available to
- Alexa. As a result, Amazon</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
- at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the present, but in the past (and, who knows,
- in the future too?)</p>
- </li>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
- voice assistants</em></ins></span> do <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
+ <span class="inserted"><ins><em><li id="M201904240">
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span
class="inserted"><ins><em>access to <a
+ <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the Alexa service staff even has
access</em></ins></span> to <span class="removed"><del><strong>Adobe</a>.
Adobe's “excuse”:</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
<p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have</em></ins></span> no
<span class="removed"><del><strong>authentication when
- accessed through</strong></del></span> <span class="inserted"><ins><em>way
- to know what happens to</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>recordings unless
human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ tell you how and where</em></ins></span> it's
+ <span class="removed"><del><strong>needed</strong></del></span> <span
class="inserted"><ins><em>done”), users have no way</em></ins></span>
+ to <span class="removed"><del><strong>check DRM!</p>
</li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>know what happens to
the recordings unless human eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>user is still
paying</em></ins></span> for
<span class="removed"><del><strong>authentication, you
couldn't</strong></del></span> <span class="inserted"><ins><em>the
subscription, and hasn't printed more pages than were
paid for.</p>
@@ -2742,20 +2737,20 @@
<p>Internet-enabled watches with</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span>
are <span class="removed"><del><strong>an
intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>malware, violating people (specially children's)
- privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to
access</a></em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>watch.</p>
-
- <p>Because of</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>security flaws,</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>watch can be
accessed from unauthorized people/devices</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>those people/devices can use</em></ins></span> the
<span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>watch to send
messages which can be dangerous for people's privacy.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
+ privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to and
from</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>watch, possibly endangering</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>child.</p>
+
+ <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>word “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”</em></ins></span>
+ to <span class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>mean
“crackers.”)</small></p>
</li>
<li id="M201603020">
@@ -3455,7 +3450,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary-surveillance.ja.po 16 Oct 2020 15:02:46 -0000 1.341
+++ proprietary-surveillance.ja.po 16 Oct 2020 18:30:47 -0000 1.342
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3557,16 +3557,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary-surveillance.pot 16 Oct 2020 15:02:46 -0000 1.280
+++ proprietary-surveillance.pot 16 Oct 2020 18:30:47 -0000 1.281
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2866,16 +2866,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a "
-"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
-"permit security brekaers (and unauthorized people) to access</a> the watch."
+"security flaws. They <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">
"
+"permit security breakers (and unauthorized people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.636
retrieving revision 1.637
diff -u -b -r1.636 -r1.637
--- proprietary-surveillance.ru.po 16 Oct 2020 15:02:46 -0000 1.636
+++ proprietary-surveillance.ru.po 16 Oct 2020 18:30:47 -0000 1.637
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -4212,16 +4212,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.de-diff.html 16 Oct 2020 15:02:46 -0000 1.182
+++ proprietary.de-diff.html 16 Oct 2020 18:30:47 -0000 1.183
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -215,11 +215,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -319,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:46 $
+$Date: 2020/10/16 18:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary.de.po 16 Oct 2020 15:02:46 -0000 1.222
+++ proprietary.de.po 16 Oct 2020 18:30:47 -0000 1.223
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -457,16 +457,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- proprietary.es.po 16 Oct 2020 15:02:47 -0000 1.327
+++ proprietary.es.po 16 Oct 2020 18:30:47 -0000 1.328
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -315,16 +315,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.369
retrieving revision 1.370
diff -u -b -r1.369 -r1.370
--- proprietary.fr.po 16 Oct 2020 15:02:47 -0000 1.369
+++ proprietary.fr.po 16 Oct 2020 18:30:48 -0000 1.370
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-10-16 14:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -310,9 +310,10 @@
#. type: Content of: <div><ul><li><p>
# | Internet-enabled watches with proprietary software are malware, violating
# | people (specially children's) privacy. In addition, they have a lot of
-# | security flaws. <a
-# |
href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
-# | permit [-access by-] security [-breakers</a> and-] {+brekaers (and+}
+# | security flaws. {+They+} <a
+# |
[-href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They-]
+# |
{+href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">+}
+# | permit [-access by-] security [-breakers</a> and-] {+breakers (and+}
# | unauthorized [-people, and can send messages from unauthorized devices.-]
# | {+people) to access</a> the watch.+}
#, fuzzy
@@ -325,8 +326,8 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
"Les montres connectées utilisant du logiciel privateur sont des objets "
@@ -338,9 +339,9 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.it-diff.html 16 Oct 2020 15:02:47 -0000 1.194
+++ proprietary.it-diff.html 16 Oct 2020 18:30:48 -0000 1.195
@@ -58,8 +58,9 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -214,11 +214,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -318,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary.it.po 16 Oct 2020 15:02:47 -0000 1.231
+++ proprietary.it.po 16 Oct 2020 18:30:48 -0000 1.232
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -461,16 +461,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary.ja-diff.html 16 Oct 2020 15:02:47 -0000 1.199
+++ proprietary.ja-diff.html 16 Oct 2020 18:30:48 -0000 1.200
@@ -55,8 +55,8 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -154,9 +154,9 @@
</td>
<td>
<ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -212,11 +212,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- proprietary.ja.po 16 Oct 2020 15:02:47 -0000 1.215
+++ proprietary.ja.po 16 Oct 2020 18:30:48 -0000 1.216
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -322,16 +322,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary.nl-diff.html 16 Oct 2020 15:02:47 -0000 1.195
+++ proprietary.nl-diff.html 16 Oct 2020 18:30:48 -0000 1.196
@@ -58,8 +58,9 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -214,11 +214,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -318,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.nl.po 16 Oct 2020 15:02:47 -0000 1.205
+++ proprietary.nl.po 16 Oct 2020 18:30:48 -0000 1.206
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -365,16 +365,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.pl-diff.html 16 Oct 2020 15:02:47 -0000 1.212
+++ proprietary.pl-diff.html 16 Oct 2020 18:30:48 -0000 1.213
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As of September, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 540
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>September, 2020, the pages in this directory
list around 450
+instances of malicious functionalities (with more than 540 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -155,16 +155,16 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -212,11 +212,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.pl.po 16 Oct 2020 15:02:47 -0000 1.198
+++ proprietary.pl.po 16 Oct 2020 18:30:48 -0000 1.199
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -542,16 +542,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary.pot 16 Oct 2020 15:02:47 -0000 1.195
+++ proprietary.pot 16 Oct 2020 18:30:48 -0000 1.196
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -259,16 +259,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a "
-"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
-"permit security brekaers (and unauthorized people) to access</a> the watch."
+"security flaws. They <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">
"
+"permit security breakers (and unauthorized people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary.pt-br-diff.html 16 Oct 2020 15:02:47 -0000 1.4
+++ proprietary.pt-br-diff.html 16 Oct 2020 18:30:48 -0000 1.5
@@ -188,30 +188,29 @@
<li <span class="removed"><del><strong>id="M202007010">
<p>BMW will remotely <a
href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
- enable and disable functionality in cars</a>
through</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>universal
+ enable and disable functionality in cars</a> through a universal
back door.</p>
</li>
<li id="M202006300">
- <p>“Bossware” is malware that
bosses</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws.</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>,
so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to
access</a></em></ins></span> the
- <span class="removed"><del><strong>bosses can spy on them.</p>
-
- <p>This shows why requiring</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
-
- <p>Because of</em></ins></span> the <span
class="removed"><del><strong>user's “consent” is not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable exposure
- to contagious disease that</strong></del></span> <span
class="inserted"><ins><em>security flaws, the watch</em></ins></span> can be
<span class="removed"><del><strong>fatal. Software like this should
- be illegal</strong></del></span> <span class="inserted"><ins><em>accessed
from unauthorized people/devices</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should</strong></del></span>
<span class="inserted"><ins><em>those people/devices can use the watch to send
messages which can</em></ins></span> be <span
class="removed"><del><strong>prosecuted</strong></del></span> <span
class="inserted"><ins><em>dangerous</em></ins></span> for <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>people's privacy.</p>
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)</em></ins></span>
+ privacy. <span class="removed"><del><strong>The
boss</strong></del></span> <span class="inserted"><ins><em>In addition, they
have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>coerce
+ most workers into consenting to almost anything, even probable
exposure</strong></del></span> <span class="inserted"><ins><em>intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>contagious disease that can be fatal.
Software like this should
+ be illegal</strong></del></span> and <span
class="removed"><del><strong>bosses</strong></del></span> <span
class="inserted"><ins><em>from the watch, possibly endangering the
child.</p>
- <p><small>(Note that this article misuses the word “<a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>demand it should be prosecuted for
it.</p></strong></del></span> <span class="inserted"><ins><em>this
article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p></em></ins></span>
</li>
@@ -331,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary.pt-br.po 16 Oct 2020 15:02:47 -0000 1.330
+++ proprietary.pt-br.po 16 Oct 2020 18:30:48 -0000 1.331
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -313,16 +313,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.403
retrieving revision 1.404
diff -u -b -r1.403 -r1.404
--- proprietary.ru.po 16 Oct 2020 15:02:47 -0000 1.403
+++ proprietary.ru.po 16 Oct 2020 18:30:48 -0000 1.404
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -315,16 +315,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.tr.po 16 Oct 2020 15:02:47 -0000 1.62
+++ proprietary.tr.po 16 Oct 2020 18:30:48 -0000 1.63
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-10-07 23:09+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -309,16 +309,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary.zh-cn.po 16 Oct 2020 15:02:47 -0000 1.68
+++ proprietary.zh-cn.po 16 Oct 2020 18:30:48 -0000 1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-10-10 13:07+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -291,16 +291,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.zh-tw-diff.html 16 Oct 2020 15:02:47 -0000 1.175
+++ proprietary.zh-tw-diff.html 16 Oct 2020 18:30:48 -0000 1.176
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -215,11 +215,11 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
- permit security brekaers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Because of the security flaws, the watch can be accessed from
unauthorized people/devices and those people/devices can use the watch to send
messages which can be dangerous for people's privacy.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -319,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/16 15:02:47 $
+$Date: 2020/10/16 18:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.zh-tw.po 16 Oct 2020 15:02:47 -0000 1.185
+++ proprietary.zh-tw.po 16 Oct 2020 18:30:48 -0000 1.186
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-16 14:55+0000\n"
+"POT-Creation-Date: 2020-10-16 18:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -435,16 +435,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- pt-br.po 16 Oct 2020 15:02:47 -0000 1.283
+++ pt-br.po 16 Oct 2020 18:30:48 -0000 1.284
@@ -8743,16 +8743,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.481
retrieving revision 1.482
diff -u -b -r1.481 -r1.482
--- ru.po 16 Oct 2020 15:02:47 -0000 1.481
+++ ru.po 16 Oct 2020 18:30:48 -0000 1.482
@@ -10635,16 +10635,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- tr.po 16 Oct 2020 15:02:47 -0000 1.61
+++ tr.po 16 Oct 2020 18:30:48 -0000 1.62
@@ -7758,16 +7758,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- zh-cn.po 16 Oct 2020 15:02:47 -0000 1.58
+++ zh-cn.po 16 Oct 2020 18:30:48 -0000 1.59
@@ -7531,16 +7531,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- zh-tw.po 16 Oct 2020 15:02:47 -0000 1.219
+++ zh-tw.po 16 Oct 2020 18:30:48 -0000 1.220
@@ -7692,16 +7692,16 @@
msgid ""
"Internet-enabled watches with proprietary software are malware, violating "
"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\">They permit security brekaers (and unauthorized "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
"people) to access</a> the watch."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Because of the security flaws, the watch can be accessed from unauthorized "
-"people/devices and those people/devices can use the watch to send messages "
-"which can be dangerous for people's privacy."
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
msgstr ""
#. type: Content of: <div><ul><li><p>