[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-in-online-conferencing....
From: |
GNUN |
Subject: |
www/proprietary malware-in-online-conferencing.... |
Date: |
Mon, 2 Nov 2020 12:32:46 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/02 12:32:45
Modified files:
proprietary : malware-in-online-conferencing.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-games.de-diff.html malware-games.de.po
malware-games.es.po malware-games.fr.po
malware-games.ja-diff.html malware-games.ja.po
malware-games.pot malware-games.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Added files:
proprietary/po : malware-in-online-conferencing.pot
malware-in-online-conferencing.translist
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.395&r2=1.396
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.553&r2=1.554
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.640&r2=1.641
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.376&r2=1.377
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.411&r2=1.412
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.491&r2=1.492
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.pot?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.translist?cvsroot=www&rev=1.1
Patches:
Index: malware-in-online-conferencing.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-in-online-conferencing.html 2 Nov 2020 10:34:36 -0000 1.1
+++ malware-in-online-conferencing.html 2 Nov 2020 17:32:37 -0000 1.2
@@ -12,7 +12,7 @@
<title>Malware in Online Conferencing
- GNU Project - Free Software Foundation</title>
<link rel="stylesheet" type="text/css" href="/side-menu.css"
media="screen,print" />
-<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+ <!--#include
virtual="/proprietary/po/malware-in-online-conferencing.translist" -->
<!--#include virtual="/server/banner.html" -->
<div class="nav">
<a id="side-menu-button" class="switch" href="#navlinks">
@@ -127,7 +127,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 10:34:36 $
+$Date: 2020/11/02 17:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/de.po 2 Nov 2020 15:02:53 -0000 1.224
+++ po/de.po 2 Nov 2020 17:32:38 -0000 1.225
@@ -5300,6 +5300,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- po/es.po 2 Nov 2020 15:02:53 -0000 1.320
+++ po/es.po 2 Nov 2020 17:32:38 -0000 1.321
@@ -4879,6 +4879,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.395
retrieving revision 1.396
diff -u -b -r1.395 -r1.396
--- po/fr.po 2 Nov 2020 15:22:50 -0000 1.395
+++ po/fr.po 2 Nov 2020 17:32:38 -0000 1.396
@@ -4351,6 +4351,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/it.po 2 Nov 2020 15:02:55 -0000 1.224
+++ po/it.po 2 Nov 2020 17:32:38 -0000 1.225
@@ -4928,6 +4928,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- po/ja.po 2 Nov 2020 15:02:55 -0000 1.232
+++ po/ja.po 2 Nov 2020 17:32:38 -0000 1.233
@@ -3783,6 +3783,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/malware-games.de-diff.html 28 Oct 2020 23:00:58 -0000 1.47
+++ po/malware-games.de-diff.html 2 Nov 2020 17:32:38 -0000 1.48
@@ -89,14 +89,29 @@
<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>program or vice versa</a>. It's
-not directly</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or
<span class="removed"><del><strong>vice versa</a>. It's
+not directly</strong></del></span> <span class="inserted"><ins><em>two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -437,7 +452,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/28 23:00:58 $
+$Date: 2020/11/02 17:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/malware-games.de.po 28 Oct 2020 23:00:58 -0000 1.48
+++ po/malware-games.de.po 2 Nov 2020 17:32:38 -0000 1.49
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-games.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-12-05 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -154,6 +154,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-games.es.po 29 Oct 2020 11:29:54 -0000 1.29
+++ po/malware-games.es.po 2 Nov 2020 17:32:38 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-10-29 11:43+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -107,6 +108,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- po/malware-games.fr.po 29 Oct 2020 08:51:33 -0000 1.87
+++ po/malware-games.fr.po 2 Nov 2020 17:32:38 -0000 1.88
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-10-29 09:49+0100\n"
"Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -103,6 +104,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- po/malware-games.ja-diff.html 28 Oct 2020 23:00:58 -0000 1.56
+++ po/malware-games.ja-diff.html 2 Nov 2020 17:32:38 -0000 1.57
@@ -89,14 +89,29 @@
<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>program or vice versa</a>. It's
-not directly</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or
<span class="removed"><del><strong>vice versa</a>. It's
+not directly</strong></del></span> <span class="inserted"><ins><em>two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -437,7 +452,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/28 23:00:58 $
+$Date: 2020/11/02 17:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/malware-games.ja.po 28 Oct 2020 23:00:58 -0000 1.48
+++ po/malware-games.ja.po 2 Nov 2020 17:32:38 -0000 1.49
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -121,6 +121,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- po/malware-games.pot 28 Oct 2020 23:00:58 -0000 1.41
+++ po/malware-games.pot 2 Nov 2020 17:32:38 -0000 1.42
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -87,6 +87,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\">requiring
"
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a "
"href=\"https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\">coerces
"
"players to spend money by overwhelming the game play with loot boxes</a>."
Index: po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- po/malware-games.ru.po 29 Oct 2020 11:00:28 -0000 1.94
+++ po/malware-games.ru.po 2 Nov 2020 17:32:38 -0000 1.95
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -105,6 +106,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/malware-microsoft.de-diff.html 2 Nov 2020 15:02:55 -0000 1.55
+++ po/malware-microsoft.de-diff.html 2 Nov 2020 17:32:38 -0000 1.56
@@ -313,7 +313,7 @@
intrusive ads for Microsoft products and its partners'
products</a>.</p>
- <p>The article's author starts from the premise that Microsoft has
+ <p>The article's author starts from the premise
that</em></ins></span> Microsoft <span class="inserted"><ins><em>has
a right to control what Windows does to users, as long as it doesn't
go “too far”. We disagree.</p>
</li>
@@ -389,7 +389,7 @@
tampering with users' settings and files</a>, notably to
“repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
- them.</em></ins></span> Microsoft <span
class="inserted"><ins><em>repeatedly pushed faulty versions of this program to
+ them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
critical</a>.</p>
@@ -452,12 +452,13 @@
<p>Once</em></ins></span> Microsoft has tricked a user
into accepting installation of Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</em></ins></span>
- find that they are denied <span class="removed"><del><strong>the option to
cancel or even postpone the
- imposed date of installation</a>.
- </p>
+ find that they are denied the option to cancel or even postpone the
+ imposed date of <span class="removed"><del><strong>installation</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p></em></ins></span>
+
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you, and you're
- going to get screwed sooner or later.</p></li>
+ software means letting someone have power over you, and you're going
+ to get screwed sooner <span class="removed"><del><strong>or
later.</p></li>
<li><p>Microsoft
has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
@@ -481,22 +482,17 @@
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
forcibly pushing Windows
update to its version 10</a>, ignoring the flag on Windows 7 or 8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
- <span class="inserted"><ins><em>imposed date</em></ins></span> of
- <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
-
- <p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
-
- <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
- to get screwed sooner or later.</p>
+ that you could set</strong></del></span> <span
class="inserted"><ins><em>or later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed to <a
-
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
+ a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
@@ -542,49 +538,27 @@
<p>A person or company has the right to cease to work on a particular
program; the wrong here is Microsoft does this after having made the
users dependent on Microsoft, because they are not free to ask anyone
- else to work on the program for <span
class="removed"><del><strong>them.</p></li>
-</ul>
-
-<h3 id="interference">Microsoft Interference</h3>
-
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ else to work on the program for <span
class="removed"><del><strong>them.</p></li></strong></del></span>
<span class="inserted"><ins><em>them.</p>
</li>
<li id="M201306220">
<p><a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
- informs</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples of Microsoft committing
-interference.</p>
-
-<ul>
- <li><p>Microsoft is planning to make Windows <a
-
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>its browser, Edge,</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in <span
class="removed"><del><strong>certain circumstances</a>.</p>
- <p>The reason Microsoft can force things on users is
that</strong></del></span> Windows <span class="removed"><del><strong>is
- nonfree.</p></li>
-
- <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>before fixing them</a>.</p>
- </li>
+ informs the NSA of bugs in Windows before fixing them</a>.</p>
+ </li></em></ins></span>
</ul>
-<h3 id="subscriptions">Subscriptions</h3>
+<h3 <span class="removed"><del><strong>id="interference">Microsoft
Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
<ul class="blurbs">
<li id="M201507150">
- <p>Microsoft Office forces users</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads for Microsoft products and its
- partners' products</a>.</p>
- <p>The article's author starts from the premise that Microsoft
- has a right</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span class="removed"><del><strong>control
what Windows does</strong></del></span> <span class="inserted"><ins><em>Office
365</em></ins></span> to <span class="removed"><del><strong>users, as long as it
- doesn't go “too far”. We disagree.</p></li>
-
- <li><p>Microsoft inserts <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside of the File
Explorer</a></strong></del></span> <span class="inserted"><ins><em>be
able</em></ins></span> to <span
class="removed"><del><strong>nag</strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
+ <p>Microsoft Office forces users <a
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
+for</strong></del></span> <span class="inserted"><ins><em>Office 365 to be
able to create/edit documents</a>.</p>
</li>
</ul>
@@ -592,9 +566,44 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples</strong></del></span> <span
class="inserted"><ins><em>game</em></ins></span> of <span
class="inserted"><ins><em>Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's
network</a>.</em></ins></span> Microsoft <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Microsoft is planning</strong></del></span>
+ <span class="inserted"><ins><em>has bought the game and will merge all
accounts into its network,
+ which will give them access</em></ins></span> to <span
class="removed"><del><strong>make Windows <a
+
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
+ impose use</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage</em></ins></span> of <span
class="removed"><del><strong>its browser, Edge, in certain
circumstances</a>.</p>
+ <p>The reason Microsoft can force things on
users</strong></del></span> <span
class="inserted"><ins><em>Minetest</em></ins></span> is that <span
class="removed"><del><strong>Windows</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> is
+ <span class="removed"><del><strong>nonfree.</p></li>
+
+ <li><p>Windows displays
+ <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its
+ partners' products</a>.</p>
+ <p>The article's author starts from</strong></del></span> <span
class="inserted"><ins><em>free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>premise that Microsoft
+ has</strong></del></span> <span class="inserted"><ins><em>user's
computer freedom. As</em></ins></span> a <span
class="removed"><del><strong>right to control what Windows does to users, as
long as</strong></del></span> <span
class="inserted"><ins><em>bonus,</em></ins></span>
+ it
+ <span class="removed"><del><strong>doesn't go “too far”. We
disagree.</p></li>
+
+ <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>offers more options.</p>
+ </li>
+
<li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
+ <p>Microsoft is</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside of the File Explorer</a> to
nag</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
@@ -1003,7 +1012,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:02:55 $
+$Date: 2020/11/02 17:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- po/malware-microsoft.de.po 2 Nov 2020 15:02:55 -0000 1.151
+++ po/malware-microsoft.de.po 2 Nov 2020 17:32:38 -0000 1.152
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -972,6 +972,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- po/malware-microsoft.es.po 2 Nov 2020 15:02:55 -0000 1.177
+++ po/malware-microsoft.es.po 2 Nov 2020 17:32:38 -0000 1.178
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -774,6 +774,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- po/malware-microsoft.fr.po 2 Nov 2020 15:22:50 -0000 1.194
+++ po/malware-microsoft.fr.po 2 Nov 2020 17:32:38 -0000 1.195
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-11-02 16:21+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -771,6 +772,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/malware-microsoft.it-diff.html 2 Nov 2020 15:02:55 -0000 1.54
+++ po/malware-microsoft.it-diff.html 2 Nov 2020 17:32:39 -0000 1.55
@@ -475,22 +475,22 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
- <span class="inserted"><ins><em>imposed date</em></ins></span> of
- <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
+ find that they are denied the option to cancel or even postpone the
+ imposed date of installation</a>.</p>
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
-
- <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
+ software means letting someone have power over you, and you're going
to get screwed sooner or later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed to <a
-
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
+ a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
@@ -536,64 +536,76 @@
<p>A person or company has the right to cease to work on a particular
program; the wrong here is Microsoft does this after having made the
users dependent on Microsoft, because they are not free to ask anyone
- else to work on the program for <span
class="removed"><del><strong>them.</p></li>
-</ul>
-
-<h3 id="interference">Microsoft Interference</h3>
-
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ else to work on the program for <span
class="removed"><del><strong>them.</p></li></strong></del></span>
<span class="inserted"><ins><em>them.</p>
</li>
<li id="M201306220">
<p><a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
- informs</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
-interference.</p>
-
-<ul>
- <li><p>Windows displays
- <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads for Microsoft products and its
- partners' products</a>.</p>
- <p>The article's author starts from the premise that Microsoft
- has a right to control what</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span
class="removed"><del><strong>does to users, as long as it
- doesn't go “too far”. We disagree.</p></li>
-
- <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>before fixing them</a>.</p>
- </li>
+ informs the NSA of bugs in Windows before fixing them</a>.</p>
+ </li></em></ins></span>
</ul>
-<h3 id="subscriptions">Subscriptions</h3>
+<h3 <span class="removed"><del><strong>id="interference">Microsoft
Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
<ul class="blurbs">
<li id="M201507150">
- <p>Microsoft Office forces users</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside of the File
Explorer</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span class="removed"><del><strong>nag
- users</strong></del></span> <span class="inserted"><ins><em>Office
365</em></ins></span> to <span class="removed"><del><strong>buy subscriptions
for the OneDrive service.</p></li>
-
-<li>In order</strong></del></span> <span class="inserted"><ins><em>be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's install base, Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.</strong></del></span>
<span class="inserted"><ins><em>create/edit
documents</a>.</p></em></ins></span>
+ <p>Microsoft Office forces users <a
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
+for</strong></del></span> <span class="inserted"><ins><em>Office 365 to be
able to create/edit documents</a>.</p>
</li>
-
-<span class="removed"><del><strong><li><p>Microsoft has
-started</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples</strong></del></span> <span
class="inserted"><ins><em>game</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
+interference.</p>
+
+<ul>
+ <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's
network</a>.</em></ins></span> Microsoft <span
class="removed"><del><strong>products</strong></del></span>
+ <span class="inserted"><ins><em>has bought the game</em></ins></span> and
<span class="inserted"><ins><em>will merge all accounts into</em></ins></span>
its
+ <span class="removed"><del><strong>partners'
products</a>.</p>
+ <p>The article's author starts from the
premise</strong></del></span> <span class="inserted"><ins><em>network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>Microsoft
+ has</strong></del></span> <span class="inserted"><ins><em>it is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a <span class="removed"><del><strong>right to control what
Windows does to users, as long as</strong></del></span> <span
class="inserted"><ins><em>bonus,</em></ins></span>
+ it
+ <span class="removed"><del><strong>doesn't go “too far”. We
disagree.</p></li>
+
+ <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>offers more options.</p>
+ </li>
+
<li id="M201912160">
- <p>Microsoft is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+ <p>Microsoft is</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside of the File Explorer</a> to
nag</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
- users <span class="removed"><del><strong>obnoxiously and
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an
account on their network</a> to be able</em></ins></span> to install
<span class="removed"><del><strong>Windows 10</a>.</p></li>
+ users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
+
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their
network</a></em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
+<li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to install <span
class="removed"><del><strong>Windows 10</a>.</p></li>
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
@@ -987,7 +999,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:02:55 $
+$Date: 2020/11/02 17:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- po/malware-microsoft.it.po 2 Nov 2020 15:02:59 -0000 1.156
+++ po/malware-microsoft.it.po 2 Nov 2020 17:32:39 -0000 1.157
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -925,6 +925,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/malware-microsoft.ja-diff.html 2 Nov 2020 15:02:59 -0000 1.69
+++ po/malware-microsoft.ja-diff.html 2 Nov 2020 17:32:39 -0000 1.70
@@ -386,11 +386,14 @@
</p></strong></del></span> <span
class="inserted"><ins><em>holds.</p></em></ins></span>
<p>Free software developers also stop maintaining old versions of
- their programs, but this is not unfair to users because the
- <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users of
+ their programs, but this is not unfair to users because the users of
free software have control over it. If it is important enough to you,
you and other users can hire someone to support the old version on
- your future platforms.</p>
+ your future <span class="removed"><del><strong>platforms.
+ </p></li>
+
+ <li><p>Microsoft
+ is</strong></del></span> <span
class="inserted"><ins><em>platforms.</p>
</li>
</ul>
@@ -404,14 +407,16 @@
<ul class="blurbs">
<li id="M201904041">
- <p>Microsoft has been <a
-
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
+ <p>Microsoft has been</em></ins></span> <a <span
class="removed"><del><strong>href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ forcibly pushing</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
force-installing a “remediation”
program</a> on computers running certain
- versions of Windows 10. Remediation, in Microsoft's view, means <a
+ versions of</em></ins></span> Windows
+ <span class="removed"><del><strong>update</strong></del></span> <span
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up">
- tampering with users' settings and files</a>, notably to
- “repair” any components of the updating system that users
+ tampering with users' settings and files</a>,
notably</em></ins></span> to <span class="removed"><del><strong>its version
10</a>, ignoring</strong></del></span>
+ <span class="inserted"><ins><em>“repair” any components
of</em></ins></span> the <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
@@ -431,7 +436,7 @@
<li id="M201704194">
<p>Microsoft has made Windows 7
- and 8 cease to function on certain new computers, <a
+ and 8 cease to function</em></ins></span> on <span
class="inserted"><ins><em>certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -439,7 +444,7 @@
<li id="M201704134">
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for Windows 7 and 8 on recent processors</a>
+ has dropped support for</em></ins></span> Windows 7 <span
class="removed"><del><strong>or</strong></del></span> <span
class="inserted"><ins><em>and 8 on recent processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons Microsoft might
@@ -449,7 +454,7 @@
<li id="M201606270">
<p id="windows10-forcing">In its efforts to trick users of Windows
- 7 and 8 into installing all-spying Windows 10 against their
+ 7 and</em></ins></span> 8 <span class="inserted"><ins><em>into installing
all-spying Windows 10 against their
will, Microsoft forced their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
silently download… the whole of Windows 10</a>! Apparently,
@@ -459,7 +464,7 @@
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out that this “upgrade” was in fact a <a
+ found out</em></ins></span> that <span class="removed"><del><strong>you
could set</strong></del></span> <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -468,31 +473,22 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option to cancel or even postpone the
- imposed date</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
+ find that they are denied the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
+ <span class="inserted"><ins><em>imposed date</em></ins></span> of
+ <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
- <p>This demonstrates what we've said for years: using
proprietary</em></ins></span>
- software <span class="inserted"><ins><em>means letting
someone</em></ins></span> have <span
class="removed"><del><strong>control</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> over <span
class="removed"><del><strong>it. If it is important
- enough to</strong></del></span> you, <span
class="removed"><del><strong>you</strong></del></span> and <span
class="removed"><del><strong>other users can hire someone to support
- the old version on your future platforms.
- </p></li>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
- <li><p>Microsoft
- is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly pushing Windows
- update</strong></del></span> <span class="inserted"><ins><em>you're
going</em></ins></span>
- to <span class="removed"><del><strong>its version 10</a>, ignoring
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>later.</p>
+ <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
+ to get screwed sooner or later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
- a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7 and 8.</p></li>
-
- <li><p>Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed to <a
+
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
@@ -551,19 +547,13 @@
<h3 <span class="removed"><del><strong>id="interference">Microsoft
Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
+<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
<ul class="blurbs">
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
-interference.</p>
-
-<ul>
-
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>Office 365 to be able to create/edit
documents</a>.</p>
+ subscribe to Office 365 to be able to create/edit
documents</a>.</p>
</li>
</ul>
@@ -571,6 +561,27 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like sabotage, but they
are not grave enough</strong></del></span> <span class="inserted"><ins><em>game
of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player</em></ins></span> to <span
class="removed"><del><strong>qualify
+for</strong></del></span> <span class="inserted"><ins><em>open an account on
Microsoft's network</a>. Microsoft
+ has bought</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>game</em></ins></span> and <span
class="removed"><del><strong>wrong. This section describes
examples</strong></del></span> <span class="inserted"><ins><em>will merge all
accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
+interference.</p>
+
+<ul>
+
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -963,7 +974,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:02:59 $
+$Date: 2020/11/02 17:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/malware-microsoft.ja.po 2 Nov 2020 15:02:59 -0000 1.136
+++ po/malware-microsoft.ja.po 2 Nov 2020 17:32:39 -0000 1.137
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -750,6 +750,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- po/malware-microsoft.pot 2 Nov 2020 15:02:59 -0000 1.94
+++ po/malware-microsoft.pot 2 Nov 2020 17:32:39 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -535,6 +535,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\">requiring
"
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a "
"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
"users to create an account on their network</a> to be able to install and "
Index: po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/malware-microsoft.ru.po 2 Nov 2020 15:02:59 -0000 1.234
+++ po/malware-microsoft.ru.po 2 Nov 2020 17:32:39 -0000 1.235
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -769,6 +769,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/nl.po 2 Nov 2020 15:02:59 -0000 1.225
+++ po/nl.po 2 Nov 2020 17:32:39 -0000 1.226
@@ -3564,6 +3564,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/pl.po 2 Nov 2020 15:02:59 -0000 1.224
+++ po/pl.po 2 Nov 2020 17:32:39 -0000 1.225
@@ -3138,6 +3138,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- po/pot 2 Nov 2020 15:02:59 -0000 1.223
+++ po/pot 2 Nov 2020 17:32:39 -0000 1.224
@@ -2908,6 +2908,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/proprietary-surveillance.de-diff.html 2 Nov 2020 15:02:59 -0000
1.136
+++ po/proprietary-surveillance.de-diff.html 2 Nov 2020 17:32:39 -0000
1.137
@@ -624,49 +624,21 @@
<li id="M201601110">
<p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their
- being nonfree. It also distributes its own nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of preventing apps from
- cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
- users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
- <span class="removed"><del><strong>do.</p>
-
- <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
- the
- <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>On the other hand,</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
+ <p>According to Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
- <span class="inserted"><ins><em>read</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
from investigation.</p>
</li>
@@ -674,30 +646,20 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
- VPN apps.”</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
- the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
- detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>users cannot
stop
- them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
- to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
</ul>
@@ -711,51 +673,25 @@
<li id="M202009183">
<p>Facebook <a
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full
access</strong></del></span> <span class="inserted"><ins><em>device's
+ on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
<li id="M202004200">
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating the Siri
software</em></ins></span> to <span class="inserted"><ins><em><a
+ made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record</em></ins></span> users' <span class="removed"><del><strong>text
messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>conversations
when they had not activated Siri</a>.
+ record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em>these recordings, in a group that made
+ <p>His job was to listen to these recordings, in a group that made
transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way</em></ins></span> to <span
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span
class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>program that
- controls access</em></ins></span> to the
- <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>microphone to decide
when</em></ins></span> the <span class="removed"><del><strong>JS injection
is</strong></del></span> <span class="inserted"><ins><em>user has
- “activated” any service,</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>be free
software, and</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way, users could make
sure Apple can't listen to them.</p>
</li>
@@ -763,505 +699,302 @@
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs</em></ins></span> that <span
class="inserted"><ins><em>possibly correspond to
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="removed"><del><strong>non-premium
version</strong></del></span> <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list most certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
- proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third
parties</a>.</p></em></ins></span>
+ sending users' personal information to third parties</a>.</p>
- <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
- trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
- but most</strong></del></span> <span class="inserted"><ins><em>phone
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
- is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
- perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
- used for.</p></em></ins></span>
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing the iOS DRM.</p></em></ins></span>
+ <li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
+ <li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
+ know you want to be spied on”.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps can collude</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150">
+ <li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>transmit users' personal
- data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
- them from there.</p></em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>Conditions” that spell out
-what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
-
- <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>video you
- take,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
- unthinkable with free software.</p>
-
- </li>
-
- <li><p>More than 73%</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
- </li>
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>break Apple's
- security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract some data from iPhones for the state</a>.</p>
- <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
+ <p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
-
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>granted that the usual analytics
tools are
- legitimate, but is that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>possible purpose</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
- <span class="inserted"><ins><em>get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p></em></ins></span>
+ turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track users, which is
<a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p></em></ins></span>
+ still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p></em></ins></span>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
- </li>
-
- <li><p>In</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>user takes</a>: starting an app, looking
at a folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>be spied on”.</p>
- </li>
-
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>a song. They send device identifying
+ <p>Xiaomi phones <a
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
- <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
- users identify themselves</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
- taken. Users would have</strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
+ other streaming dis-services make a dossier about each user, and <a
+ href="/malware/proprietary-surveillance.html#M201508210"> they make
+ users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
<p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this</em></ins></span> no <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
+ but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>tell whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>there.</p></strong></del></span> <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p></em></ins></span>
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
- <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
+ <li id="M201811230">
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
+ it saved up the data, and sent them all later</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
- even <span class="removed"><del><strong>gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
- the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</em></ins></span> with <span class="removed"><del><strong>third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>spyware sending lots of data to
China</a>.</p></em></ins></span>
+ <li id="M201611150">
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to China</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
+ <li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video</strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
-
- <p>Even if</em></ins></span> you <span
class="removed"><del><strong>take,</strong></del></span> <span
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
- Any edits</strong></del></span> <span class="inserted"><ins><em>location
tracking,</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>must
- disable Google Play itself to completely stop</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span class="inserted"><ins><em>yet another example</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ tracks the users' movements without their permission</a>.</p>
- <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="inserted"><ins><em>user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
<li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
- </li>
-
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
- transmission</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature</strong></del></span> <span
class="inserted"><ins><em>substantial expense</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>users.
Said transmission,
- not wanted or requested</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
- is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span>
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>, and they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us</em></ins></span> by <span
class="removed"><del><strong>default, though</strong></del></span> <span
class="inserted"><ins><em>a paywall) reports</em></ins></span> that <span
class="inserted"><ins><em><a
+ Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</em></ins></span> can <span class="removed"><del><strong>be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>remotely activate the GPS</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>microphone in Android phones
- and laptops</a> (presumably Windows laptops). Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a> (presumably Windows laptops). Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
- <p>Spyware is present in</em></ins></span> some <span
class="inserted"><ins><em>Android devices when they are
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ sends personal data to Motorola</a>.</p>
</li>
<li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</em></ins></span> for <span class="inserted"><ins><em>voice
all</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ listens for voice all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
+ <li id="M201302150">
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>personal details of
users that install</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
- or it</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>totally
incompetent.</a></p>
- </li>
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>not enough to
+ <p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users,
instead</em></ins></span> of <span class="removed"><del><strong>iOS
seem</strong></del></span>
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
- and</em></ins></span> other <span class="removed"><del><strong>than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>companies from getting this personal information
in</em></ins></span> the
- <span class="inserted"><ins><em>first place!</p>
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>user reads at
what time</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
@@ -1280,16 +1013,14 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
- for Firefox and Chrome were found</em></ins></span> to <span
class="inserted"><ins><em><a
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
snoop on users' detailed browsing habits</a>. Mozilla and Google
- removed</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>problematic
extensions</em></ins></span> from <span class="inserted"><ins><em>their stores,
but this shows
+ removed the problematic extensions from their stores, but this shows
once more how unsafe nonfree software can be. Tools that are supposed
to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
+ additional malware (the system itself being the original
malware).</p>
</li>
<li id="M201811020">
@@ -1509,7 +1240,7 @@
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
+ Google's policies. But it seems that</em></ins></span> Google <span
class="removed"><del><strong>redistributes</strong></del></span> <span
class="inserted"><ins><em>wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
@@ -1533,20 +1264,22 @@
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
+ haven't yet, but they should also stay away from</em></ins></span> nonfree
<span class="removed"><del><strong>Android apps, and
+ therefore shares</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> in <span
class="removed"><del><strong>the responsibility for the
injustice</strong></del></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
- <p>An investigation of the 150 most popular
+ <p>An investigation</em></ins></span> of <span
class="inserted"><ins><em>the 150 most popular
gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ 25% fail to protect</em></ins></span> their
+ <span class="removed"><del><strong>being nonfree. It</strong></del></span>
<span class="inserted"><ins><em>usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
- found as well.</p>
+ potentially</em></ins></span> also <span
class="removed"><del><strong>distributes its own nonfree apps,
such</strong></del></span> <span class="inserted"><ins><em>be used to spy on
users. Other technical flaws were
+ found</em></ins></span> as <span class="inserted"><ins><em>well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
@@ -1596,12 +1329,16 @@
</li>
<li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <p>Some</em></ins></span> Google
+ <span class="removed"><del><strong>Play,</strong></del></span> <span
class="inserted"><ins><em>apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>other ways to turn off the other
kinds</em></ins></span> of <span class="removed"><del><strong>preventing apps
from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
@@ -1612,56 +1349,98 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be sure from the article.</p>
-
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>We expect it implements DRM, too—that
there</em></ins></span> is no <span
class="removed"><del><strong>systematic</strong></del></span> way <span
class="removed"><del><strong>for Google, or Android
+ users, to inspect executable proprietary apps</strong></del></span> to
<span class="removed"><del><strong>see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>save
+ a recording. But we can't be sure from</em></ins></span> the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat
users</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in
+ <span class="removed"><del><strong>various</strong></del></span>
+ <span class="inserted"><ins><em>many</em></ins></span> ways. <span
class="removed"><del><strong>If it did a good job</strong></del></span> <span
class="inserted"><ins><em>This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of <span class="removed"><del><strong>this, it could more or less
+ prevent such snooping, except when</strong></del></span> the <span
class="removed"><del><strong>app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>protect us.
We must demand release</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these proprietary apps
whose</em></ins></span>
+ source code <span class="removed"><del><strong>to the
+ public, so we can depend on each other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security
+ of 283 Android VPN</strong></del></span> <span
class="inserted"><ins><em>they cannot look at. The other</em></ins></span>
apps <span class="removed"><del><strong>concluded</strong></del></span> <span
class="inserted"><ins><em>might be snooping
in other ways.</p>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
+ <p>This is evidence</em></ins></span> that <span
class="removed"><del><strong>“in spite of the
+ promises for privacy, security, and anonymity given by the
+ majority of VPN apps—millions of</strong></del></span> <span
class="inserted"><ins><em>proprietary apps generally work against
+ their users. To protect their privacy and freedom,
Android</em></ins></span> users <span class="removed"><del><strong>may be
unawarely subject</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted by
+ VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>get rid</em></ins></span> of <span
class="inserted"><ins><em>the</em></ins></span> proprietary <span
class="removed"><del><strong>VPN</strong></del></span> <span
class="inserted"><ins><em>software—both proprietary
Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ and the proprietary apps by getting</em></ins></span> apps from the <span
class="removed"><del><strong>research paper</strong></del></span> <span
class="inserted"><ins><em>free software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>privacy of
+ users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+ which users are HIV-positive, then provides the
information</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ It could be designed so that</em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>communicate such info to each
+ other but not to</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code></strong></del></span>
<span class="inserted"><ins><em>server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong><code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to
+ users' text messages.</dd>
+
+ <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
+ for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android</em></ins></span> apps
+ <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1671,7 +1450,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server.</p>
+ book</em></ins></span> to <span class="removed"><del><strong>LinkedIn.
Also, it stores detailed logs</strong></del></span> <span
class="inserted"><ins><em>developer's server.</p>
<p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
@@ -1681,38 +1460,66 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ calls</em></ins></span> and <span class="removed"><del><strong>may
turn</strong></del></span> <span
class="inserted"><ins><em>sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails</em></ins></span> to
<span class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>UK government if
+ requested.</dd>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
+ worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <p>On</em></ins></span> the <span class="removed"><del><strong>JS
injection is to display
+ ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
+ <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+
+ <p>But since Google itself develops malicious</em></ins></span>
apps, <span class="removed"><del><strong>it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>we cannot
trust
+ Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>source
code to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
+ <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop</em></ins></span> on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1720,60 +1527,110 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span
class="inserted"><ins><em>programs</a>.</p></em></ins></span>
</li>
- <li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704260">
+ <p>Faceapp appears to do lots</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands</em></ins></span> to <span
class="removed"><del><strong>transmit users'</strong></del></span> personal
data <span class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>in the device</a>.</p></em></ins></span>
</li>
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app would record</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="inserted"><ins><em>the audio files</em></ins></span> users <span
class="removed"><del><strong>is not enough</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span>
+ <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
+
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and other companies from getting</strong></del></span> this <span
class="removed"><del><strong>personal information in the first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> <span class="inserted"><ins><em>was done
without</em></ins></span> the users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>consent.
+ If</em></ins></span> the <span class="removed"><del><strong>tracking.
This is
+ yet another example of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such a
thing</strong></del></span> <span class="inserted"><ins><em>app said that users
gave consent for this,</em></ins></span>
+ would <span class="inserted"><ins><em>that make it acceptable? No way! It
should</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs</em></ins></span> of <span class="removed"><del><strong>the
most popular</strong></del></span> Android apps <span
class="inserted"><ins><em>can collude
+ to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens</em></ins></span> of <span
class="removed"><del><strong>their users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>thousands of pairs that
collude</a>.</p></em></ins></span>
</li>
- <li id="M201703300">
- <p>Verizon <a
-
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to the app's functionality,
+ was</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software.</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
+ on some of its phones.</em></ins></span> The <span
class="removed"><del><strong>clear way to say
+ “zero price”</strong></del></span> <span
class="inserted"><ins><em>app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is <a
+ <p>Currently, the app</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+
+ <p>The article</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ explicitly opt-in before the app</em></ins></span> takes <span
class="removed"><del><strong>for granted that</strong></del></span> <span
class="inserted"><ins><em>effect. However,</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>app
+ remains spyware—an “optional” piece of
spyware</em></ins></span> is <span class="removed"><del><strong>that valid?
Software developers have no right</strong></del></span>
+ <span class="inserted"><ins><em>still spyware.</p>
</li>
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong</strong></del></span> <span class="inserted"><ins><em>a
Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1782,221 +1639,375 @@
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ consent” for surveillance is inadequate</em></ins></span> as <span
class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>a
protection against
+ massive surveillance.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201611160">
+ <span class="inserted"><ins><em><li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
+ 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>concluded that “in spite of the promises
+ for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>anonymity given
by</em></ins></span> the <span class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span> <span
class="inserted"><ins><em>majority of VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
+ <p>Following is</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span class="inserted"><ins><em>track users and show
them targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full
access</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>users'
text messages.</dd>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ <dt>DroidVPN</em></ins></span> and <span
class="inserted"><ins><em>TigerVPN</dt>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em><code>READ_LOGS</code> permission
to read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong><a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>stores
detailed logs and
may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
+ <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because this
+ would require circumventing</strong></del></span> the <span
class="removed"><del><strong>iOS DRM.</p>
+ </li>
+
+ <li><p>In</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>latest iThings
system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
- </dl>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
+ five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
+ the
+ <span class="removed"><del><strong>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really</strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app</em></ins></span> does
<span class="removed"><del><strong>turn them off—only until 5am.
+ That's Apple</strong></del></span> <span
class="inserted"><ins><em>JavaScript injection</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p></strong></del></span>
+ <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without
having</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
<li id="M201606050">
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ scans</em></ins></span> your <span
class="removed"><del><strong>fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>mobile phone's photo collections for known
faces</a>,
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>picture you take according to who</em></ins></span>
is <span class="removed"><del><strong>snooping on
+ them.</p></li>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span>
+ <span class="inserted"><ins><em>in the frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>require online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>pictures
are likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>Facebook's servers</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even if</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>the service.</p></em></ins></span>
</li>
- <li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605310">
+ <p>Facebook's app listens all</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span
class="inserted"><ins><em>time,</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ it may be analyzing people's conversations to serve them</em></ins></span>
with <span class="removed"><del><strong>third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
- it can alter them too</a>.</p>
+ spy on many sorts of data in</em></ins></span> the <span
class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
+ it can alter</em></ins></span> them <span class="removed"><del><strong>up
to date</strong></del></span> <span
class="inserted"><ins><em>too</a>.</p>
</li>
<li id="M201601130">
<p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>all your devices.
+ Any edits you make</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs</em></ins></span>
+ are <span class="removed"><del><strong>automatically updated everywhere.
[...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed</strong></del></span> <span
class="inserted"><ins><em>playing nearby</a>. Also</em></ins></span> on
<span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>what users post on
various sites
+ such</em></ins></span> as <span class="removed"><del><strong>a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>Facebook, Google+
and Twitter.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ unrelated</em></ins></span> to <span class="inserted"><ins><em>the app's
functionality, was</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>get at them,</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
+ legitimate,</em></ins></span> but <span class="removed"><del><strong>NSA
can access</strong></del></span> <span class="inserted"><ins><em>is that valid?
Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ that snoop are just as wrong as</em></ins></span> any <span
class="inserted"><ins><em>other snooping.</p>
</li>
<li id="M201510300">
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
- third parties.</p>
+ <p>More than 73% and 47%</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:
+ the</strong></del></span> <span class="inserted"><ins><em>mobile
applications, for Android and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>location
information</a> of their users with
+ third parties.</p></em></ins></span>
</li>
- <li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ to realize that</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
+
+ <p>This article shows the</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</em></ins></span> that <span class="removed"><del><strong>can
be
+ turned off.</p>
+ </li>
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201506264">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
- Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
+ A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>paid
+ proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
+ is <span class="removed"><del><strong>the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
- <li id="M201505060">
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
<span class="removed"><del><strong>contact list. This malware is designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>average.</p></em></ins></span>
+ <li><p>According</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>average.</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+ <li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user</a>.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>in addition</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201504060">
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>a
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone
company,</em></ins></span> and <span class="removed"><del><strong>they send so
much data that their transmission is a
substantial expense for users. Said transmission, not wanted or
- requested</strong></del></span> <span class="inserted"><ins><em>in
addition to
- the snooping done</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute spying of some
+ requested</strong></del></span> <span
class="inserted"><ins><em>perhaps</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>OS in
+ the phone.</p>
+
+ <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>some
kind.</p></li>
- <li><p>A Motorola</strong></del></span> phone
- <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>OS</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us</strong></del></span>
- <span class="inserted"><ins><em>the phone.</p>
-
- <p>Don't be distracted</em></ins></span> by <span
class="removed"><del><strong>a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>question of
whether</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>app developers
- get users to say “I agree”. That</em></ins></span> is
- <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>no excuse for
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>app developers
+ get users to say “I agree”. That is no excuse for
malware.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>optional</a>.
Not
+ is doing this</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by</strong></del></span> a
<span class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>at least is
visible</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>optional</a>. Not
as bad as what the others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p></strong></del></span>
+ <p>The Simeji keyboard</em></ins></span> is <span
class="inserted"><ins><em>a smartphone version of Baidu's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
<span class="inserted"><ins><em><li id="M201312270">
- <p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
- use <span class="removed"><del><strong>of</strong></del></span> <span
class="inserted"><ins><em>of data on the user's computer, but it does
surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>the user's
computer, but it does surveillance too:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></em></ins></span>
+ it <span class="removed"><del><strong>will eventually require all new
portable phones</strong></del></span> <span
class="inserted"><ins><em>tries</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>get the user's list of other people's phone
numbers</a>.</p>
</li>
@@ -2006,12 +2017,9 @@
sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
- approve sending personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>user's computer,</strong></del></span> <span
class="inserted"><ins><em>app developer</em></ins></span> but <span
class="inserted"><ins><em>did not ask
- about sending</em></ins></span> it <span class="removed"><del><strong>does
surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>weakness</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p></strong></del></span>
- <span class="inserted"><ins><em>the reject-it-if-you-dislike-snooping
“solution” to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -2021,71 +2029,93 @@
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app and dis-service spy on users even more than
users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
-
- <li><p>AI-powered driving apps</strong></del></span> <span
class="inserted"><ins><em>say whether it</em></ins></span> can <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>restrict
+ the use of data on the user's computer, but</strong></del></span> <span
class="inserted"><ins><em>say whether</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it can do
so.</p></em></ins></span>
+ <p>That almost certainly means</em></ins></span> it <span
class="removed"><del><strong>tries to get the user's list of other people's
phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>can do so.</p>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <li id="M201307110">
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically for spying</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app and dis-service spy</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance</em></ins></span> on <span class="removed"><del><strong>users
even more than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can</strong></del></span> <span
class="inserted"><ins><em>the game of Minecraft by</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
+ every <span class="removed"><del><strong>move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span> <span
class="inserted"><ins><em>player to open an account on Microsoft's
network</a>. Microsoft
+ has bought the game</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
+ book</strong></del></span> <span class="inserted"><ins><em>will merge
all accounts into its network,
+ which will give them access</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>this article misuses</strong></del></span>
<span class="inserted"><ins><em>it is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li>
- <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>Facebook's app listens all the time,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude</em></ins></span>
on <span class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>privacy.</p></em></ins></span>
+ having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -3826,7 +3856,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:02:59 $
+$Date: 2020/11/02 17:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- po/proprietary-surveillance.de.po 2 Nov 2020 15:03:00 -0000 1.350
+++ po/proprietary-surveillance.de.po 2 Nov 2020 17:32:40 -0000 1.351
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3588,6 +3588,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- po/proprietary-surveillance.es.po 2 Nov 2020 15:03:00 -0000 1.92
+++ po/proprietary-surveillance.es.po 2 Nov 2020 17:32:40 -0000 1.93
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-10-18 11:38+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -3067,6 +3067,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.553
retrieving revision 1.554
diff -u -b -r1.553 -r1.554
--- po/proprietary-surveillance.fr.po 2 Nov 2020 15:22:50 -0000 1.553
+++ po/proprietary-surveillance.fr.po 2 Nov 2020 17:32:40 -0000 1.554
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-11-02 16:21+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3069,6 +3070,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary-surveillance.it-diff.html 2 Nov 2020 15:03:00 -0000
1.202
+++ po/proprietary-surveillance.it-diff.html 2 Nov 2020 17:32:40 -0000
1.203
@@ -2323,6 +2323,21 @@
</div>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201908210">
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
@@ -3642,7 +3657,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- po/proprietary-surveillance.it.po 2 Nov 2020 15:03:00 -0000 1.362
+++ po/proprietary-surveillance.it.po 2 Nov 2020 17:32:41 -0000 1.363
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3383,6 +3383,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary-surveillance.ja-diff.html 2 Nov 2020 15:03:00 -0000
1.220
+++ po/proprietary-surveillance.ja-diff.html 2 Nov 2020 17:32:41 -0000
1.221
@@ -2099,6 +2099,21 @@
</div>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201908210">
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
@@ -3484,7 +3499,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- po/proprietary-surveillance.ja.po 2 Nov 2020 15:03:00 -0000 1.344
+++ po/proprietary-surveillance.ja.po 2 Nov 2020 17:32:41 -0000 1.345
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2600,6 +2600,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- po/proprietary-surveillance.pot 2 Nov 2020 15:03:00 -0000 1.283
+++ po/proprietary-surveillance.pot 2 Nov 2020 17:32:41 -0000 1.284
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2079,6 +2079,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\">requiring
"
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a "
"href=\"https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana\">
"
"human workers listen to the recordings</a>."
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.640
retrieving revision 1.641
diff -u -b -r1.640 -r1.641
--- po/proprietary-surveillance.ru.po 2 Nov 2020 15:03:00 -0000 1.640
+++ po/proprietary-surveillance.ru.po 2 Nov 2020 17:32:42 -0000 1.641
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -3038,6 +3038,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary.de-diff.html 2 Nov 2020 15:03:00 -0000 1.186
+++ po/proprietary.de-diff.html 2 Nov 2020 17:32:42 -0000 1.187
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -212,6 +212,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -248,15 +263,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -320,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:42 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/proprietary.de.po 2 Nov 2020 15:03:00 -0000 1.226
+++ po/proprietary.de.po 2 Nov 2020 17:32:43 -0000 1.227
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -524,15 +541,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- po/proprietary.es.po 2 Nov 2020 15:03:00 -0000 1.333
+++ po/proprietary.es.po 2 Nov 2020 17:32:43 -0000 1.334
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -323,6 +323,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -389,21 +406,6 @@
"com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"
"\">utilizar servicios de pago de terceros sin autorización.</a>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-"El aparato de cocción al vacÃo Mellow está vinculado a un servidor. La "
-"compañÃa <a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-"
-"unwelcome-subscription-surprise-27630842/\">convirtió de improviso esa "
-"vinculación al servidor en una suscripción</a> que prohÃbe a los usuarios "
-"beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
-"paguen una tarifa mensual."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +487,20 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the “"
+#~ "advanced features” of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "El aparato de cocción al vacÃo Mellow está vinculado a un servidor. La "
+#~ "compañÃa <a
href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-"
+#~ "unwelcome-subscription-surprise-27630842/\">convirtió de improviso esa "
+#~ "vinculación al servidor en una suscripción</a> que prohÃbe a los
usuarios "
+#~ "beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
+#~ "paguen una tarifa mensual."
+
+#~ msgid ""
#~ "Many employers are using nonfree software, including videoconference "
#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.376
retrieving revision 1.377
diff -u -b -r1.376 -r1.377
--- po/proprietary.fr.po 2 Nov 2020 15:22:50 -0000 1.376
+++ po/proprietary.fr.po 2 Nov 2020 17:32:43 -0000 1.377
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-11-02 16:21+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -315,6 +316,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -390,20 +408,6 @@
"money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"
"\">utiliser des services tiers de paiement sans autorisation</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-"L'appareil de cuisson sous vide Mellow est couplé à un serveur. Cette "
-"société a soudainement <a
href=\"https://www.slashgear.com/mellow-sous-vide-"
-"owners-get-unwelcome-subscription-surprise-27630842/\">transformé ce simple "
-"ancrage en un abonnement</a> qui interdit aux utilisateurs de profiter des "
-"« fonctionnalités avancées » à moins de payer une cotisation
mensuelle."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -478,6 +482,20 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the “"
+#~ "advanced features” of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "L'appareil de cuisson sous vide Mellow est couplé à un serveur. Cette "
+#~ "société a soudainement <a href=\"https://www.slashgear.com/mellow-sous-"
+#~ "vide-owners-get-unwelcome-subscription-surprise-27630842/\">transformé ce
"
+#~ "simple ancrage en un abonnement</a> qui interdit aux utilisateurs de "
+#~ "profiter des « fonctionnalités avancées » à moins de payer une
cotisation "
+#~ "mensuelle."
+
+#~ msgid ""
#~ "Many employers are using nonfree software, including videoconference "
#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- po/proprietary.it-diff.html 2 Nov 2020 15:03:00 -0000 1.198
+++ po/proprietary.it-diff.html 2 Nov 2020 17:32:43 -0000 1.199
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -125,19 +125,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -247,15 +262,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -319,7 +325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- po/proprietary.it.po 2 Nov 2020 15:03:00 -0000 1.235
+++ po/proprietary.it.po 2 Nov 2020 17:32:43 -0000 1.236
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -517,15 +534,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/proprietary.ja-diff.html 2 Nov 2020 15:03:00 -0000 1.203
+++ po/proprietary.ja-diff.html 2 Nov 2020 17:32:43 -0000 1.204
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -158,15 +158,15 @@
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -210,6 +210,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -246,15 +261,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -318,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary.ja.po 2 Nov 2020 15:03:00 -0000 1.219
+++ po/proprietary.ja.po 2 Nov 2020 17:32:45 -0000 1.220
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -375,15 +392,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- po/proprietary.nl-diff.html 2 Nov 2020 15:03:00 -0000 1.199
+++ po/proprietary.nl-diff.html 2 Nov 2020 17:32:45 -0000 1.200
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -247,15 +262,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -319,7 +325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary.nl.po 2 Nov 2020 15:03:00 -0000 1.209
+++ po/proprietary.nl.po 2 Nov 2020 17:32:45 -0000 1.210
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -420,15 +437,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/proprietary.pl-diff.html 2 Nov 2020 15:03:00 -0000 1.216
+++ po/proprietary.pl-diff.html 2 Nov 2020 17:32:45 -0000 1.217
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -55,14 +55,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>September, 2020, the pages in this directory
list around 450
-instances of malicious functionalities (with more than 540 references to
+<p>As of September, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 540
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -156,17 +156,17 @@
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -210,6 +210,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -246,15 +261,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -318,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary.pl.po 2 Nov 2020 15:03:00 -0000 1.202
+++ po/proprietary.pl.po 2 Nov 2020 17:32:45 -0000 1.203
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -601,15 +618,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- po/proprietary.pot 2 Nov 2020 15:03:00 -0000 1.199
+++ po/proprietary.pot 2 Nov 2020 17:32:45 -0000 1.200
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a "
+"href=\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java\">requiring
"
+"every player to open an account on Microsoft's network</a>. Microsoft has "
+"bought the game and will merge all accounts into its network, which will "
+"give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a "
"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
"users to create an account on their network</a> to be able to install and "
@@ -309,15 +326,6 @@
"utilizing third-party payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/\">
"
-"turned this tethering into a subscription</a>, forbidding users from taking "
-"advantage of the “advanced features” of the cooker unless they "
-"pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary.pt-br-diff.html 2 Nov 2020 15:03:00 -0000 1.8
+++ po/proprietary.pt-br-diff.html 2 Nov 2020 17:32:45 -0000 1.9
@@ -187,13 +187,25 @@
<ul class="blurbs">
<li <span class="removed"><del><strong>id="M202007010">
- <p>BMW will remotely <a
- href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
- enable and disable functionality in cars</a> through a universal
- back door.</p>
+ <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game</em></ins></span> and <span
class="removed"><del><strong>disable functionality in cars</a>
through</strong></del></span> <span class="inserted"><ins><em>will merge all
accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a <span class="removed"><del><strong>universal
+ back door.</p></strong></del></span> <span
class="inserted"><ins><em>bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M202006300">
+ <li <span class="removed"><del><strong>id="M202006300">
<p>“Bossware”</strong></del></span> <span
class="inserted"><ins><em>id="M201912160">
<p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>malware that bosses</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
@@ -204,22 +216,22 @@
<p>This shows why requiring</strong></del></span> <span
class="inserted"><ins><em>their network</a> to be able to install
and use</em></ins></span> the <span class="removed"><del><strong>user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is
<span class="removed"><del><strong>not
- an adequate basis for protecting digital privacy.</strong></del></span>
<span class="inserted"><ins><em>malware.</em></ins></span> The <span
class="removed"><del><strong>boss</strong></del></span> <span
class="inserted"><ins><em>account</em></ins></span> can <span
class="removed"><del><strong>coerce
+ an adequate basis for protecting digital privacy.</strong></del></span>
<span class="inserted"><ins><em>malware.</em></ins></span> The <span
class="removed"><del><strong>boss can coerce
most workers into consenting to almost anything, even probable exposure
- to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should</strong></del></span>
- be <span class="removed"><del><strong>prosecuted</strong></del></span>
<span class="inserted"><ins><em>used</em></ins></span> for <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance and/or violating people's rights in many
ways,
+ to contagious disease that</strong></del></span> <span
class="inserted"><ins><em>account</em></ins></span> can
+ be <span class="removed"><del><strong>fatal. Software like this should
+ be illegal and bosses that demand it should be
prosecuted</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> for <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance and/or violating people's rights in many
ways,
such as turning their purchased software to a subscription
product.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"></strong></del></span>
<span class="inserted"><ins><em>id="M202010220">
- <p>The</em></ins></span> addictive <span
class="removed"><del><strong>features</a> derived
from</strong></del></span> <span class="inserted"><ins><em>Genshin Impact
relentlessly</em></ins></span> <a
- <span
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness">
+ <p>The</em></ins></span> addictive <span
class="removed"><del><strong>features</a> derived from <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">
behavioral manipulation techniques</a>. Certain
- repetitive aspects of the game, like <a
- href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
+ repetitive aspects of the game, like</strong></del></span> <span
class="inserted"><ins><em>Genshin Impact relentlessly</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
grinding</a>, can be minimised by becoming a paying member, and can
thus encourage children and impressionable people</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -256,19 +268,11 @@
<p>Roblox (among many other games)
created anti-features which sucker children into</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>.
This</strong></del></span>
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
- utilizing third-party payment services without
authorization.</a></p>
- </li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker</em></ins></span> is <span
class="removed"><del><strong>illegal due</strong></del></span>
- <span class="inserted"><ins><em>tethered</em></ins></span> to <span
class="inserted"><ins><em>a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of</em></ins></span> the <span
class="removed"><del><strong>Video Privacy Protection Act</strong></del></span>
<span class="inserted"><ins><em>“advanced
features”</em></ins></span> of <span class="removed"><del><strong>1988,
but they're circumventing
- it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>the cooker
- unless they pay a monthly fee.</p></em></ins></span>
+ utilizing third-party payment services without
authorization.</a></p></em></ins></span>
</li>
</ul>
@@ -332,7 +336,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:00 $
+$Date: 2020/11/02 17:32:45 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/proprietary.pt-br.po 2 Nov 2020 15:03:00 -0000 1.334
+++ po/proprietary.pt-br.po 2 Nov 2020 17:32:45 -0000 1.335
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -371,15 +388,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.411
retrieving revision 1.412
diff -u -b -r1.411 -r1.412
--- po/proprietary.ru.po 2 Nov 2020 15:03:00 -0000 1.411
+++ po/proprietary.ru.po 2 Nov 2020 17:32:45 -0000 1.412
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -319,6 +319,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -386,20 +403,6 @@
"spent-600-on-their-ipads-without-my-knowledge\"> полÑзованиÑ
ÑлÑжбами оплаÑÑ "
"ÑÑеÑÑиÑ
ÑÑоÑон без пÑовеÑки
подлинноÑÑи</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-"ÐбоÑÑдование Ð´Ð»Ñ ÑÑ-вида Mellow пÑивÑзано к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð½ÐµÐ¾Ð¶Ð¸Ð´Ð°Ð½Ð½Ð¾ <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> обÑаÑило ÑÑÑ Ð¿ÑивÑзкÑ
в подпиÑкÑ</a>, "
-"запÑеÑив полÑзоваÑелÑм пÑименÑÑÑ
“пÑогÑеÑÑивнÑе ÑÑнкÑии” "
-"обоÑÑдованиÑ, еÑли Ñе не вноÑÑÑ
ежемеÑÑÑнÑÑ Ð¿Ð»Ð°ÑÑ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -476,6 +479,19 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the “"
+#~ "advanced features” of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "ÐбоÑÑдование Ð´Ð»Ñ ÑÑ-вида Mellow пÑивÑзано к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð½ÐµÐ¾Ð¶Ð¸Ð´Ð°Ð½Ð½Ð¾ "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> обÑаÑило ÑÑÑ
пÑивÑÐ·ÐºÑ Ð² подпиÑкÑ</a>, "
+#~ "запÑеÑив полÑзоваÑелÑм пÑименÑÑÑ
“пÑогÑеÑÑивнÑе ÑÑнкÑии” "
+#~ "обоÑÑдованиÑ, еÑли Ñе не вноÑÑÑ
ежемеÑÑÑнÑÑ Ð¿Ð»Ð°ÑÑ."
+
+#~ msgid ""
#~ "Many employers are using nonfree software, including videoconference "
#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/proprietary.tr.po 2 Nov 2020 16:23:07 -0000 1.69
+++ po/proprietary.tr.po 2 Nov 2020 17:32:45 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-11-02 17:18+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 17:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -313,6 +314,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -386,20 +404,6 @@
"my-knowledge\"> yetkilendirme olmadan üçüncü taraf ödeme hizmetlerini "
"kullanmak üzere</a> aldatan anti-özellikler oluÅturdu."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-"Mellow sous-vide piÅirici bir sunucuya baÄlıdır. Åirket birdenbire <a
href="
-"\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> bu yuları bir aboneliÄe çevirdi</a>, "
-"aylık bir ücret ödemedikleri takdirde kullanıcıların piÅiricinin
“"
-"geliÅmiŠözelliklerinden” yararlanmalarını yasaklıyor."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +485,19 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the “"
+#~ "advanced features” of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "Mellow sous-vide piÅirici bir sunucuya baÄlıdır. Åirket birdenbire <a
"
+#~ "href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> bu yuları bir aboneliÄe çevirdi</a>,
"
+#~ "aylık bir ücret ödemedikleri takdirde kullanıcıların piÅiricinin
“"
+#~ "geliÅmiŠözelliklerinden” yararlanmalarını yasaklıyor."
+
+#~ msgid ""
#~ "Many employers are using nonfree software, including videoconference "
#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary.zh-cn.po 2 Nov 2020 15:03:01 -0000 1.74
+++ po/proprietary.zh-cn.po 2 Nov 2020 17:32:45 -0000 1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-10-19 11:31+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -296,6 +296,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -353,19 +370,6 @@
"theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-"
"my-knowledge\">使ç¨æ éææç第ä¸æ¹æ¯ä»åè½ã</a>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-"Mellow sous-vide çµé¥ç
²å¨ç»å®äºä¸ä¸ªæå¡å¨ã该å
¬å¸çªç¶ <a
href=\"https://www."
-"slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-"
-"surprise-27630842/\">æç»å®æ¹ä¸ºæ³¨å</a>ï¼å¦æç¨æ·ä¸ä»æç§è´¹ï¼é£ä¹ä»ä»¬å°±ä¸è½ä½¿"
-"ç¨çµé¥ç
²çæäº “é«çº§åè½”ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +454,18 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "The Mellow sous-vide cooker is tethered to a server. The company suddenly "
+#~ "<a href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
+#~ "subscription-surprise-27630842/\"> turned this tethering into a "
+#~ "subscription</a>, forbidding users from taking advantage of the “"
+#~ "advanced features” of the cooker unless they pay a monthly fee."
+#~ msgstr ""
+#~ "Mellow sous-vide çµé¥ç
²å¨ç»å®äºä¸ä¸ªæå¡å¨ã该å
¬å¸çªç¶ <a
href=\"https://"
+#~ "www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-"
+#~
"surprise-27630842/\">æç»å®æ¹ä¸ºæ³¨å</a>ï¼å¦æç¨æ·ä¸ä»æç§è´¹ï¼é£ä¹ä»ä»¬å°±ä¸"
+#~ "è½ä½¿ç¨çµé¥ç
²çæäº “é«çº§åè½”ã"
+
+#~ msgid ""
#~ "Many employers are using nonfree software, including videoconference "
#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- po/proprietary.zh-tw-diff.html 2 Nov 2020 15:03:01 -0000 1.179
+++ po/proprietary.zh-tw-diff.html 2 Nov 2020 17:32:45 -0000 1.180
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -69,7 +69,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -212,6 +212,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
+ </li>
+
<li id="M201912160">
<p>Microsoft is <a
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
@@ -248,15 +263,6 @@
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
-
- <li id="M202007270">
- <p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly <a
-
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
- unless they pay a monthly fee.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -320,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 15:03:01 $
+$Date: 2020/11/02 17:32:45 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- po/proprietary.zh-tw.po 2 Nov 2020 15:03:01 -0000 1.189
+++ po/proprietary.zh-tw.po 2 Nov 2020 17:32:45 -0000 1.190
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 14:55+0000\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
"setup-now-prevents-local-account-creation/\">tricking users to create an "
"account on their network</a> to be able to install and use the Windows "
@@ -490,15 +507,6 @@
"payment services without authorization.</a>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Mellow sous-vide cooker is tethered to a server. The company suddenly <a "
-"href=\"https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-"
-"subscription-surprise-27630842/\"> turned this tethering into a "
-"subscription</a>, forbidding users from taking advantage of the “"
-"advanced features” of the cooker unless they pay a monthly fee."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- po/pt-br.po 2 Nov 2020 15:03:01 -0000 1.288
+++ po/pt-br.po 2 Nov 2020 17:32:45 -0000 1.289
@@ -3529,6 +3529,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.491
retrieving revision 1.492
diff -u -b -r1.491 -r1.492
--- po/ru.po 2 Nov 2020 15:03:01 -0000 1.491
+++ po/ru.po 2 Nov 2020 17:32:45 -0000 1.492
@@ -4316,6 +4316,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- po/tr.po 2 Nov 2020 16:30:57 -0000 1.69
+++ po/tr.po 2 Nov 2020 17:32:45 -0000 1.70
@@ -3121,6 +3121,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/zh-cn.po 2 Nov 2020 15:03:01 -0000 1.64
+++ po/zh-cn.po 2 Nov 2020 17:32:45 -0000 1.65
@@ -3106,6 +3106,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/zh-tw.po 2 Nov 2020 15:03:01 -0000 1.224
+++ po/zh-tw.po 2 Nov 2020 17:32:45 -0000 1.225
@@ -3137,6 +3137,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is imposing its surveillance on the game of Minecraft by <a href="
+"\"https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-"
+"mojang-java\">requiring every player to open an account on Microsoft's "
+"network</a>. Microsoft has bought the game and will merge all accounts into "
+"its network, which will give them access to people's data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+"play Minetest</a> instead. The essential advantage of Minetest is that it is "
+"free software, meaning it respects the user's computer freedom. As a bonus, "
+"it offers more options."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
Index: po/malware-in-online-conferencing.pot
===================================================================
RCS file: po/malware-in-online-conferencing.pot
diff -N po/malware-in-online-conferencing.pot
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/malware-in-online-conferencing.pot 2 Nov 2020 17:32:38 -0000
1.1
@@ -0,0 +1,139 @@
+# LANGUAGE translation of
https://www.gnu.org/proprietary/malware-in-online-conferencing.html
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the original article.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: malware-in-online-conferencing.html\n"
+"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: Content of: <title>
+msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
+msgstr ""
+
+#. type: Content of: <div><a>
+msgid "<a id=\"side-menu-button\" class=\"switch\" href=\"#navlinks\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><a><img>
+msgid "Section contents"
+msgstr ""
+
+#. type: Attribute 'alt' of: <div><a><img>
+msgid " [Section contents] "
+msgstr ""
+
+#. type: Content of: <div>
+msgid "</a>"
+msgstr ""
+
+#. type: Content of: <div><p><a>
+msgid "<a href=\"/\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><p><a><img>
+msgid "GNU Home"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"</a> / <a href=\"/proprietary/proprietary.html\">Malware</a> / By "
+"product /"
+msgstr ""
+
+#. type: Content of: <div><h2>
+msgid "Malware in Online Conferencing"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Nonfree (proprietary) software is very often malware (designed to mistreat "
+"the user). Nonfree software is controlled by its developers, which puts them "
+"in a position of power over the users; <a "
+"href=\"/philosophy/free-software-even-more-important.html\">that is the "
+"basic injustice</a>. The developers and manufacturers often exercise that "
+"power to the detriment of the users they ought to serve."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><div><p>
+msgid ""
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:webmasters@gnu.org\"><webmasters@gnu.org></a> to inform "
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid "First item"
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Please send general FSF & GNU inquiries to <a "
+"href=\"mailto:gnu@gnu.org\"><gnu@gnu.org></a>. There are also <a "
+"href=\"/contact/\">other ways to contact</a> the FSF. Broken links and "
+"other corrections or suggestions can be sent to <a "
+"href=\"mailto:webmasters@gnu.org\"><webmasters@gnu.org></a>."
+msgstr ""
+
+#. TRANSLATORS: Ignore the original text in this paragraph,
+#. replace it with the translation of these two:
+#
+#. We work hard and do our best to provide accurate, good quality
+#. translations. However, we are not exempt from imperfection.
+#. Please send your comments and general suggestions in this regard
+#. to <a href="mailto:web-translators@gnu.org">
+#
+#. <web-translators@gnu.org></a>.</p>
+#
+#. <p>For information on coordinating and contributing translations of
+#. our web pages, see <a
+#. href="/server/standards/README.translations.html">Translations
+#. README</a>.
+#. type: Content of: <div><div><p>
+msgid ""
+"Please see the <a "
+"href=\"/server/standards/README.translations.html\">Translations README</a> "
+"for information on coordinating and contributing translations of this "
+"article."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Copyright © 2020 Free Software Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"This page is licensed under a <a rel=\"license\" "
+"href=\"http://creativecommons.org/licenses/by/4.0/\">Creative Commons "
+"Attribution 4.0 International License</a>."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr ""
+
+#. timestamp start
+#. type: Content of: <div><p>
+msgid "Updated:"
+msgstr ""
Index: po/malware-in-online-conferencing.translist
===================================================================
RCS file: po/malware-in-online-conferencing.translist
diff -N po/malware-in-online-conferencing.translist
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/malware-in-online-conferencing.translist 2 Nov 2020 17:32:38 -0000
1.1
@@ -0,0 +1,10 @@
+<!-- begin translist file -->
+<!--#set var="TRANSLATION_LIST"
+value='<div id="translations">
+<p>
+<span dir="ltr" class="original">[en] <a lang="en" hreflang="en"
href="/proprietary/malware-in-online-conferencing.en.html">English</a>
</span>
+</p>
+</div>' -->
+<link rel="alternate" type="text/html"
href="/proprietary/malware-in-online-conferencing.html" hreflang="x-default" />
+<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-in-online-conferencing.en.html" title="English" />
+<!-- end translist file -->
- www/proprietary malware-in-online-conferencing....,
GNUN <=
- www/proprietary malware-in-online-conferencing...., Ali Reza Hayati, 2020/11/10
- www/proprietary malware-in-online-conferencing...., GNUN, 2020/11/11
- www/proprietary malware-in-online-conferencing...., Ali Reza Hayati, 2020/11/19
- www/proprietary malware-in-online-conferencing...., GNUN, 2020/11/19
- www/proprietary malware-in-online-conferencing...., Ali Reza Hayati, 2020/11/23
- www/proprietary malware-in-online-conferencing...., GNUN, 2020/11/23