[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www education/edu-cases-argentina-ecen.de.html ...
From: |
GNUN |
Subject: |
www education/edu-cases-argentina-ecen.de.html ... |
Date: |
Tue, 10 Nov 2020 12:37:49 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/10 12:37:45
Modified files:
education : edu-cases-argentina-ecen.de.html
edu-cases-argentina-ecen.el.html
edu-cases-argentina-ecen.es.html
edu-cases-argentina-ecen.fr.html
edu-cases-argentina-ecen.hr.html
edu-cases-argentina-ecen.it.html
edu-cases-argentina-ecen.ja.html
edu-cases-argentina-ecen.lt.html
edu-cases-argentina-ecen.pt-br.html
edu-cases-argentina-ecen.ru.html
edu-cases-argentina-ecen.tr.html
edu-cases-argentina-ecen.uk.html
edu-cases-argentina-ecen.zh-cn.html
edu-cases-india-ambedkar.ar.html
edu-cases-india-ambedkar.de.html
edu-cases-india-ambedkar.el.html
edu-cases-india-ambedkar.es.html
edu-cases-india-ambedkar.fr.html
edu-cases-india-ambedkar.hr.html
edu-cases-india-ambedkar.it.html
edu-cases-india-ambedkar.ja.html
edu-cases-india-ambedkar.lt.html
edu-cases-india-ambedkar.pt-br.html
edu-cases-india-ambedkar.ru.html
edu-cases-india-ambedkar.tr.html
edu-cases-india-ambedkar.uk.html
edu-cases-india-ambedkar.zh-cn.html
edu-cases-india-irimpanam.de.html
edu-cases-india-irimpanam.el.html
edu-cases-india-irimpanam.es.html
edu-cases-india-irimpanam.fr.html
edu-cases-india-irimpanam.hr.html
edu-cases-india-irimpanam.it.html
edu-cases-india-irimpanam.ja.html
edu-cases-india-irimpanam.ko.html
edu-cases-india-irimpanam.lt.html
edu-cases-india-irimpanam.ml.html
edu-cases-india-irimpanam.nl.html
edu-cases-india-irimpanam.pl.html
edu-cases-india-irimpanam.pt-br.html
edu-cases-india-irimpanam.ru.html
edu-cases-india-irimpanam.tr.html
edu-cases-india-irimpanam.uk.html
edu-cases-india-irimpanam.zh-cn.html
edu-schools.ar.html edu-schools.ca.html
edu-schools.de.html edu-schools.es.html
edu-schools.fr.html edu-schools.it.html
edu-schools.ja.html edu-schools.lt.html
edu-schools.ml.html edu-schools.nl.html
edu-schools.pl.html edu-schools.pt-br.html
edu-schools.ru.html edu-schools.sq.html
edu-schools.tr.html edu-schools.uk.html
edu-schools.zh-cn.html
edu-software-gimp.es.html
edu-software-gimp.fr.html
edu-software-gimp.hr.html
edu-software-gimp.it.html
edu-software-gimp.ja.html
edu-software-gimp.pt-br.html
edu-software-gimp.tr.html
edu-software-gimp.uk.html
edu-software-gimp.zh-cn.html
remote-education-children-freedom-privacy-at-stake.es.html
remote-education-children-freedom-privacy-at-stake.fr.html
remote-education-children-freedom-privacy-at-stake.tr.html
remote-education-children-freedom-privacy-at-stake.zh-cn.html
education/po : edu-cases-argentina-ecen.de-en.html
edu-cases-argentina-ecen.de.po
edu-cases-argentina-ecen.el-en.html
edu-cases-argentina-ecen.el.po
edu-cases-argentina-ecen.es-en.html
edu-cases-argentina-ecen.es.po
edu-cases-argentina-ecen.fr-en.html
edu-cases-argentina-ecen.fr.po
edu-cases-argentina-ecen.hr-en.html
edu-cases-argentina-ecen.hr.po
edu-cases-argentina-ecen.it-en.html
edu-cases-argentina-ecen.it.po
edu-cases-argentina-ecen.ja-en.html
edu-cases-argentina-ecen.ja.po
edu-cases-argentina-ecen.lt-en.html
edu-cases-argentina-ecen.lt.po
edu-cases-argentina-ecen.pot
edu-cases-argentina-ecen.pt-br-en.html
edu-cases-argentina-ecen.pt-br.po
edu-cases-argentina-ecen.ru-en.html
edu-cases-argentina-ecen.ru.po
edu-cases-argentina-ecen.tr-en.html
edu-cases-argentina-ecen.tr.po
edu-cases-argentina-ecen.uk-en.html
edu-cases-argentina-ecen.uk.po
edu-cases-argentina-ecen.zh-cn-en.html
edu-cases-argentina-ecen.zh-cn.po
edu-cases-india-ambedkar.ar-en.html
edu-cases-india-ambedkar.ar.po
edu-cases-india-ambedkar.de-en.html
edu-cases-india-ambedkar.de.po
edu-cases-india-ambedkar.el-en.html
edu-cases-india-ambedkar.el.po
edu-cases-india-ambedkar.es-en.html
edu-cases-india-ambedkar.es.po
edu-cases-india-ambedkar.fr-en.html
edu-cases-india-ambedkar.fr.po
edu-cases-india-ambedkar.hr-en.html
edu-cases-india-ambedkar.hr.po
edu-cases-india-ambedkar.it-en.html
edu-cases-india-ambedkar.it.po
edu-cases-india-ambedkar.ja-en.html
edu-cases-india-ambedkar.ja.po
edu-cases-india-ambedkar.lt-en.html
edu-cases-india-ambedkar.lt.po
edu-cases-india-ambedkar.pot
edu-cases-india-ambedkar.pt-br-en.html
edu-cases-india-ambedkar.pt-br.po
edu-cases-india-ambedkar.ru-en.html
edu-cases-india-ambedkar.ru.po
edu-cases-india-ambedkar.tr-en.html
edu-cases-india-ambedkar.tr.po
edu-cases-india-ambedkar.uk-en.html
edu-cases-india-ambedkar.uk.po
edu-cases-india-ambedkar.zh-cn-en.html
edu-cases-india-ambedkar.zh-cn.po
edu-cases-india-irimpanam.de-en.html
edu-cases-india-irimpanam.de.po
edu-cases-india-irimpanam.el-en.html
edu-cases-india-irimpanam.el.po
edu-cases-india-irimpanam.es-en.html
edu-cases-india-irimpanam.es.po
edu-cases-india-irimpanam.fr-en.html
edu-cases-india-irimpanam.fr.po
edu-cases-india-irimpanam.hr-en.html
edu-cases-india-irimpanam.hr.po
edu-cases-india-irimpanam.it-en.html
edu-cases-india-irimpanam.it.po
edu-cases-india-irimpanam.ja-en.html
edu-cases-india-irimpanam.ja.po
edu-cases-india-irimpanam.ko-en.html
edu-cases-india-irimpanam.ko.po
edu-cases-india-irimpanam.lt-en.html
edu-cases-india-irimpanam.lt.po
edu-cases-india-irimpanam.ml-en.html
edu-cases-india-irimpanam.ml.po
edu-cases-india-irimpanam.nl-en.html
edu-cases-india-irimpanam.nl.po
edu-cases-india-irimpanam.pl-en.html
edu-cases-india-irimpanam.pl.po
edu-cases-india-irimpanam.pot
edu-cases-india-irimpanam.pt-br-en.html
edu-cases-india-irimpanam.pt-br.po
edu-cases-india-irimpanam.ru-en.html
edu-cases-india-irimpanam.ru.po
edu-cases-india-irimpanam.tr-en.html
edu-cases-india-irimpanam.tr.po
edu-cases-india-irimpanam.uk-en.html
edu-cases-india-irimpanam.uk.po
edu-cases-india-irimpanam.zh-cn-en.html
edu-cases-india-irimpanam.zh-cn.po
edu-schools.ar-en.html edu-schools.ar.po
edu-schools.ca-en.html edu-schools.ca.po
edu-schools.de-en.html edu-schools.de.po
edu-schools.el-diff.html edu-schools.el.po
edu-schools.es-en.html edu-schools.es.po
edu-schools.fr-en.html edu-schools.fr.po
edu-schools.hr-diff.html edu-schools.hr.po
edu-schools.it-en.html edu-schools.it.po
edu-schools.ja-en.html edu-schools.ja.po
edu-schools.lt-en.html edu-schools.lt.po
edu-schools.ml-en.html edu-schools.ml.po
edu-schools.nl-en.html edu-schools.nl.po
edu-schools.pl-en.html edu-schools.pl.po
edu-schools.pot edu-schools.pt-br-en.html
edu-schools.pt-br.po edu-schools.ru-en.html
edu-schools.ru.po edu-schools.sq-en.html
edu-schools.sq.po edu-schools.tr-en.html
edu-schools.tr.po edu-schools.uk-en.html
edu-schools.uk.po edu-schools.zh-cn-en.html
edu-schools.zh-cn.po
edu-software-gimp.es-en.html
edu-software-gimp.fr-en.html
edu-software-gimp.hr-en.html
edu-software-gimp.it-en.html
edu-software-gimp.ja-en.html
edu-software-gimp.pt-br-en.html
edu-software-gimp.tr-en.html
edu-software-gimp.uk-en.html
edu-software-gimp.zh-cn-en.html
remote-education-children-freedom-privacy-at-stake.es-en.html
remote-education-children-freedom-privacy-at-stake.es.po
remote-education-children-freedom-privacy-at-stake.fr-en.html
remote-education-children-freedom-privacy-at-stake.fr.po
remote-education-children-freedom-privacy-at-stake.pot
remote-education-children-freedom-privacy-at-stake.tr-en.html
remote-education-children-freedom-privacy-at-stake.tr.po
remote-education-children-freedom-privacy-at-stake.zh-cn-en.html
remote-education-children-freedom-privacy-at-stake.zh-cn.po
philosophy : saying-no-even-once.es.html
saying-no-even-once.fr.html
saying-no-even-once.tr.html
saying-no-even-once.zh-cn.html
self-interest.fr.html self-interest.ru.html
self-interest.zh-cn.html
self-interest.zh-tw.html
philosophy/po : saying-no-even-once.es-en.html
saying-no-even-once.es.po
saying-no-even-once.fr-en.html
saying-no-even-once.fr.po
saying-no-even-once.pot
saying-no-even-once.tr-en.html
saying-no-even-once.tr.po
saying-no-even-once.zh-cn-en.html
saying-no-even-once.zh-cn.po
self-interest.fr-en.html
self-interest.ru-en.html
self-interest.zh-cn-en.html
self-interest.zh-tw-en.html
proprietary : malware-games.es.html malware-games.fr.html
malware-games.ru.html malware-mobiles.es.html
malware-mobiles.fr.html malware-mobiles.ru.html
malware-webpages.es.html
malware-webpages.fr.html
malware-webpages.ru.html
potential-malware.es.html
potential-malware.fr.html
potential-malware.ru.html
proprietary-addictions.es.html
proprietary-addictions.fr.html
proprietary-addictions.ru.html
proprietary-addictions.tr.html
proprietary-back-doors.es.html
proprietary-back-doors.fr.html
proprietary-back-doors.ru.html
proprietary-censorship.ru.html
proprietary-coverups.es.html
proprietary-coverups.fr.html
proprietary-coverups.ru.html
proprietary-deception.es.html
proprietary-deception.fr.html
proprietary-deception.ru.html
proprietary-drm.es.html proprietary-drm.fr.html
proprietary-drm.ru.html
proprietary-fraud.es.html
proprietary-fraud.fr.html
proprietary-fraud.ru.html
proprietary-incompatibility.es.html
proprietary-incompatibility.fr.html
proprietary-incompatibility.ru.html
proprietary-insecurity.es.html
proprietary-insecurity.fr.html
proprietary-insecurity.ru.html
proprietary-interference.es.html
proprietary-interference.fr.html
proprietary-interference.ru.html
proprietary-jails.es.html
proprietary-jails.fr.html
proprietary-jails.ru.html
proprietary-manipulation.es.html
proprietary-manipulation.fr.html
proprietary-manipulation.ru.html
proprietary-obsolescence.es.html
proprietary-obsolescence.fr.html
proprietary-obsolescence.ru.html
proprietary-sabotage.es.html
proprietary-sabotage.fr.html
proprietary-sabotage.ru.html
proprietary-subscriptions.es.html
proprietary-subscriptions.fr.html
proprietary-subscriptions.ru.html
proprietary-surveillance.es.html
proprietary-surveillance.fr.html
proprietary-surveillance.ru.html
proprietary-tethers.es.html
proprietary-tethers.fr.html
proprietary-tethers.ru.html
proprietary-tyrants.es.html
proprietary-tyrants.fr.html
proprietary-tyrants.pt-br.html
proprietary-tyrants.ru.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-games.de-diff.html malware-games.de.po
malware-games.es-en.html malware-games.es.po
malware-games.fr-en.html malware-games.fr.po
malware-games.ja-diff.html malware-games.ja.po
malware-games.pot malware-games.ru-en.html
malware-games.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po
malware-mobiles.es-en.html
malware-mobiles.es.po
malware-mobiles.fr-en.html
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru-en.html
malware-mobiles.ru.po
malware-webpages.de-diff.html
malware-webpages.de.po
malware-webpages.es-en.html
malware-webpages.es.po
malware-webpages.fr-en.html
malware-webpages.fr.po malware-webpages.pot
malware-webpages.ru-en.html
malware-webpages.ru.po nl.po pl.po pot
potential-malware.de-diff.html
potential-malware.de.po
potential-malware.es-en.html
potential-malware.es.po
potential-malware.fr-en.html
potential-malware.fr.po potential-malware.pot
potential-malware.ru-en.html
potential-malware.ru.po
proprietary-addictions.es-en.html
proprietary-addictions.es.po
proprietary-addictions.fr-en.html
proprietary-addictions.fr.po
proprietary-addictions.pot
proprietary-addictions.ru-en.html
proprietary-addictions.ru.po
proprietary-addictions.tr-en.html
proprietary-addictions.tr.po
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es-en.html
proprietary-back-doors.es.po
proprietary-back-doors.fr-en.html
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru-en.html
proprietary-back-doors.ru.po
proprietary-censorship.de-diff.html
proprietary-censorship.de.po
proprietary-censorship.es.po
proprietary-censorship.fr.po
proprietary-censorship.it-diff.html
proprietary-censorship.it.po
proprietary-censorship.ja-diff.html
proprietary-censorship.ja.po
proprietary-censorship.pot
proprietary-censorship.ru-en.html
proprietary-censorship.ru.po
proprietary-coverups.de-diff.html
proprietary-coverups.de.po
proprietary-coverups.es-en.html
proprietary-coverups.es.po
proprietary-coverups.fr-en.html
proprietary-coverups.fr.po
proprietary-coverups.ja-diff.html
proprietary-coverups.ja.po
proprietary-coverups.pot
proprietary-coverups.ru-en.html
proprietary-coverups.ru.po
proprietary-deception.de-diff.html
proprietary-deception.de.po
proprietary-deception.es-en.html
proprietary-deception.es.po
proprietary-deception.fr-en.html
proprietary-deception.fr.po
proprietary-deception.ja-diff.html
proprietary-deception.ja.po
proprietary-deception.pot
proprietary-deception.ru-en.html
proprietary-deception.ru.po
proprietary-drm.de-diff.html
proprietary-drm.de.po
proprietary-drm.es-en.html
proprietary-drm.es.po
proprietary-drm.fr-en.html
proprietary-drm.fr.po
proprietary-drm.it-diff.html
proprietary-drm.it.po
proprietary-drm.ja-diff.html
proprietary-drm.ja.po proprietary-drm.pot
proprietary-drm.ru-en.html
proprietary-drm.ru.po
proprietary-fraud.es-en.html
proprietary-fraud.es.po
proprietary-fraud.fr-en.html
proprietary-fraud.fr.po proprietary-fraud.pot
proprietary-fraud.ru-en.html
proprietary-fraud.ru.po
proprietary-incompatibility.es-en.html
proprietary-incompatibility.es.po
proprietary-incompatibility.fr-en.html
proprietary-incompatibility.fr.po
proprietary-incompatibility.pot
proprietary-incompatibility.ru-en.html
proprietary-incompatibility.ru.po
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es-en.html
proprietary-insecurity.es.po
proprietary-insecurity.fr-en.html
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary-interference.de-diff.html
proprietary-interference.de.po
proprietary-interference.es-en.html
proprietary-interference.es.po
proprietary-interference.fr-en.html
proprietary-interference.fr.po
proprietary-interference.ja-diff.html
proprietary-interference.ja.po
proprietary-interference.pot
proprietary-interference.ru-en.html
proprietary-interference.ru.po
proprietary-jails.de-diff.html
proprietary-jails.de.po
proprietary-jails.es-en.html
proprietary-jails.es.po
proprietary-jails.fr-en.html
proprietary-jails.fr.po
proprietary-jails.it-diff.html
proprietary-jails.it.po
proprietary-jails.ja-diff.html
proprietary-jails.ja.po proprietary-jails.pot
proprietary-jails.ru-en.html
proprietary-jails.ru.po
proprietary-manipulation.es-en.html
proprietary-manipulation.es.po
proprietary-manipulation.fr-en.html
proprietary-manipulation.fr.po
proprietary-manipulation.pot
proprietary-manipulation.ru-en.html
proprietary-manipulation.ru.po
proprietary-obsolescence.es-en.html
proprietary-obsolescence.es.po
proprietary-obsolescence.fr-en.html
proprietary-obsolescence.fr.po
proprietary-obsolescence.pot
proprietary-obsolescence.ru-en.html
proprietary-obsolescence.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.es-en.html
proprietary-sabotage.es.po
proprietary-sabotage.fr-en.html
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru-en.html
proprietary-sabotage.ru.po
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.de.po
proprietary-subscriptions.es-en.html
proprietary-subscriptions.es.po
proprietary-subscriptions.fr-en.html
proprietary-subscriptions.fr.po
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ja.po
proprietary-subscriptions.pot
proprietary-subscriptions.ru-en.html
proprietary-subscriptions.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es-en.html
proprietary-surveillance.es.po
proprietary-surveillance.fr-en.html
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
proprietary-tethers.de-diff.html
proprietary-tethers.de.po
proprietary-tethers.es-en.html
proprietary-tethers.es.po
proprietary-tethers.fr-en.html
proprietary-tethers.fr.po
proprietary-tethers.ja-diff.html
proprietary-tethers.ja.po
proprietary-tethers.pot
proprietary-tethers.pt-br-diff.html
proprietary-tethers.pt-br.po
proprietary-tethers.ru-en.html
proprietary-tethers.ru.po
proprietary-tyrants.de-diff.html
proprietary-tyrants.de.po
proprietary-tyrants.es-en.html
proprietary-tyrants.es.po
proprietary-tyrants.fr-en.html
proprietary-tyrants.fr.po
proprietary-tyrants.it-diff.html
proprietary-tyrants.it.po
proprietary-tyrants.ja-diff.html
proprietary-tyrants.ja.po
proprietary-tyrants.pot
proprietary-tyrants.pt-br-en.html
proprietary-tyrants.pt-br.po
proprietary-tyrants.ru-en.html
proprietary-tyrants.ru.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.de.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.el.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.fr.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.hr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.ja.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.lt.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.pt-br.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.ru.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.tr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.uk.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-argentina-ecen.zh-cn.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ar.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.de.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.el.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.es.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.fr.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.hr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.it.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ja.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.lt.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.pt-br.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.ru.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.uk.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-ambedkar.zh-cn.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.de.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.el.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.es.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.fr.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.hr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.it.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ja.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ko.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.lt.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ml.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.nl.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.pl.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.pt-br.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.tr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.uk.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.zh-cn.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ar.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ca.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.de.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.es.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.it.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ja.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.lt.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ml.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.nl.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.pl.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.pt-br.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.ru.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.sq.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.tr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.uk.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-schools.zh-cn.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.es.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.hr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.ja.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.pt-br.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.uk.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-gimp.zh-cn.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.fr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.tr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/remote-education-children-freedom-privacy-at-stake.zh-cn.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.de-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.el-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.el.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.fr-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.hr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.hr.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.it.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ja-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ja.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.lt-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.lt.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pt-br-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.pt-br.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.ru.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.tr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.tr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.uk-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.uk.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.zh-cn-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-argentina-ecen.zh-cn.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ar-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ar.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.de-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.de.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.el-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.el.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.es.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.fr-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.fr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.hr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.hr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.it.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ja-en.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.lt-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.lt.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pot?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pt-br-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.pt-br.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.tr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.tr.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.uk-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.uk.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.zh-cn-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-ambedkar.zh-cn.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.de-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.el-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.el.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.es-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.es.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.fr-en.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.hr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.hr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.it-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.it.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ja-en.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ja.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ko-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ko.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.lt-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.lt.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ml-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ml.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.nl-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.nl.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pl-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pl.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pot?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pt-br-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.pt-br.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.tr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.uk-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.uk.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.zh-cn-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.zh-cn.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ar-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ar.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ca-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ca.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.de-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.de.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.el-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.el.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.es-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.fr-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.hr-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.hr.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.it-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.it.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ja-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.lt-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.lt.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ml-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ml.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.nl-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.nl.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pl-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pt-br-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.pt-br.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ru-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.sq-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.sq.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.tr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.uk-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.uk.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.zh-cn-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-schools.zh-cn.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.hr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.ja-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.pt-br-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.uk-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-software-gimp.zh-cn-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.pot?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.tr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.tr.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/saying-no-even-once.zh-cn.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.fr.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.ru.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.zh-cn.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/self-interest.zh-tw.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.tr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.tr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.zh-cn-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/saying-no-even-once.zh-cn.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.fr-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.ru-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.zh-cn-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/self-interest.zh-tw-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.fr.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.ru.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.tr.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.ru.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.fr.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ru.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.fr.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.ru.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.es.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.es.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.pt-br.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.pot?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.fr.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.pot?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.ru.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.es.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pot?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pot?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.351&r2=1.352
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.555&r2=1.556
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.345&r2=1.346
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.642&r2=1.643
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.de.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.es-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.es.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pot?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pt-br-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pt-br.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.230&r2=1.231
Patches:
Index: education/edu-cases-argentina-ecen.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.de.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- education/edu-cases-argentina-ecen.de.html 31 May 2020 05:01:40 -0000
1.44
+++ education/edu-cases-argentina-ecen.de.html 10 Nov 2020 17:37:25 -0000
1.45
@@ -49,12 +49,14 @@
<h2><span xml:lang="es" lang="es">Escuela Cristiana Evangélica de Neuquén
(ECEN)</span></h2>
-<p class="italic">
+<blockquote>
+<p>
Die folgenden Informationen wurden einem an uns eingesandten Bericht von der
Grundschullehrerin Debora Badilla Huento (<abbr title="Escuela Cristiana
Evangélica de Neuquén" xml:lang="es" lang="es">ECEN</abbr>) entnommen. Ihr
Engagement spielte eine Schlüsselrolle, das Bewusstsein für Freie Software
zu sensibilisieren und letztendlich die Schule zu migrieren.</p>
+</blockquote>
<div class="article">
<h3>Standort</h3>
@@ -181,9 +183,11 @@
helfen.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Wir danken allen Beteiligten für die ausgezeichnete Arbeit bei der
Migration.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -245,7 +249,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2020/05/31 05:01:40 $
+$Date: 2020/11/10 17:37:25 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.el.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.el.html 31 May 2020 05:01:13 -0000
1.5
+++ education/edu-cases-argentina-ecen.el.html 10 Nov 2020 17:37:27 -0000
1.6
@@ -48,12 +48,14 @@
<div id="last-div" class="reduced-width">
<h2>ΧÏιÏÏÎ¹Î±Î½Î¹ÎºÏ ÎÏ
Î±Î³Î³ÎµÎ»Î¹ÎºÏ Î£Ïολείο ÏοÏ
Neuquén
(ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
Îι ακÏλοÏ
Î¸ÎµÏ ÏληÏοÏοÏÎ¯ÎµÏ Î±Î½Ïλήθηκαν αÏÏ
μια αναÏοÏά ÏοÏ
Ï
Ïοβλήθηκε Ïε εμάÏ
αÏÏ Ïη ÎαÏκάλα Î ÏÏÏÎ¿Î²Î¬Î¸Î¼Î¹Î±Ï ÎκÏαίδεÏ
ÏηÏ
ÏοÏ
ECEN Debora Badilla Huento. Î
δική ÏÎ·Ï Î´ÎÏμεÏ
Ïη ÎÏαιξε Îναν ÏÏοÏ
δαίο
ÏÏλο ÏÏην εÏ
αιÏθηÏοÏοίηÏη για Ïο
ÎλεÏθεÏο ÎογιÏÎ¼Î¹ÎºÏ ÎºÎ±Î¹, Ïε ÏελεÏ
Ïαία ανάλÏ
Ïη, για να οδηγηθεί Ïο ÏÏολείο
ÏÏην ÏÏαγμαÏοÏοίηÏη ÏÎ·Ï Î¼ÎµÏάβαÏηÏ.</p>
+</blockquote>
<div class="article">
<h3>ΤοÏοθεÏία</h3>
@@ -189,9 +191,11 @@
κοινÏÏηÏεÏ.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Îα θÎλαμε να εκÏÏάÏοÏ
με Ïην εκÏίμηÏή μαÏ
ÏÏÎ¿Ï ÏλοÏ
Ï ÏοÏ
Ï ÎµÎ¼ÏλεκÏμενοÏ
Ï ÏÏην
ÏÏοÏÏάθεια μεÏάβαÏÎ·Ï Î³Î¹Î± Ïο εξαιÏεÏικÏ
ÎÏγο ÏοÏ
εÏιÏελÎÏÏηκε.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -255,7 +259,7 @@
<p class="unprintable"><!-- timestamp start -->
ÎνημεÏÏθηκε:
-$Date: 2020/05/31 05:01:13 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/edu-cases-argentina-ecen.es.html 31 May 2020 05:01:00 -0000
1.11
+++ education/edu-cases-argentina-ecen.es.html 10 Nov 2020 17:37:27 -0000
1.12
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
La siguiente información se tomó de un informe que nos presentara Débora
Badilla Huento, maestra de primaria de la ECEN. Su dedicación desempeñó un
papel fundamental en la toma de conciencia acerca del software libre en la
escuela, lo que en última instancia condujo a la migración.</p>
+</blockquote>
<div class="article">
<h3>Ubicación</h3>
@@ -180,9 +182,11 @@
otras comunidades educativas.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Queremos expresar nuestro agradecimiento a todas las personas involucradas
en el proceso de la migración por la excelente labor realizada.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -242,7 +246,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.fr.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-cases-argentina-ecen.fr.html 5 Oct 2020 13:13:17 -0000
1.38
+++ education/edu-cases-argentina-ecen.fr.html 10 Nov 2020 17:37:27 -0000
1.39
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
L'information donnée ici est extraite d'un rapport qui nous a été soumis par
Debora Badilla Huento, professeur du primaire à l'ECEN. Son engagement a
joué un rôle clé dans la sensibilisation de l'école au logiciel libre, qui
a
abouti à sa migration.</p>
+</blockquote>
<div class="article">
<h3>Situation</h3>
@@ -181,9 +183,11 @@
afin d'aider les autres communautés éducatives.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Nous voudrions exprimer notre gratitude à toutes les personnes impliquées
dans l'effort de migration, pour leur excellent travail.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -245,7 +249,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.hr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-cases-argentina-ecen.hr.html 31 May 2020 05:02:15 -0000
1.10
+++ education/edu-cases-argentina-ecen.hr.html 10 Nov 2020 17:37:27 -0000
1.11
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
SljedeÄe informacije izdvojene su iz izvjeÅ¡taja kojeg nam je dostavila
osnovnoÅ¡kolska uÄiteljica iz ECEN-a Debora Badilla Huento. Njezina je
predanost odigrala kljuÄnu ulogu u podizanju svijesti o slobodnom softveru
i, na kraju, dovela do prelaska škole na korištenje slobodnog softvera.</p>
+</blockquote>
<div class="article">
<h3>Lokacija</h3>
@@ -170,9 +172,11 @@
Å¡irimo ono Å¡to smo nauÄili kako bismo pomogli drugim obrazovnim
zajednicama.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Željeli bismo izraziti našu zahvalnost na izvrsno obavljenom poslu svim
ljudima ukljuÄenima u proces migracije.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -230,7 +234,7 @@
<p class="unprintable"><!-- timestamp start -->
Vrijeme zadnje izmjene:
-$Date: 2020/05/31 05:02:15 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.it.html 31 May 2020 05:02:41 -0000
1.5
+++ education/edu-cases-argentina-ecen.it.html 10 Nov 2020 17:37:27 -0000
1.6
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Scuola Cristiana Evangelica di Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
Le informazioni seguenti sono state estratte da una relazione inviataci da
Debora Badilla Huento, insegnante elementare dell'ECEN. Il suo impegno ha
giocato un ruolo chiave nell'opera di sensibilizzazione sul Software Libero
e, alla fine, nell'ottenere che la scuola migrasse.</p>
+</blockquote>
<div class="article">
<h3>Ubicazione</h3>
@@ -179,9 +181,11 @@
comunità educative.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Vorremmo esprimere il nostro apprezzamento per l'eccellente lavoro a tutti
quanti sono stati coinvolti nello sforzo per la migrazione.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -241,7 +245,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2020/05/31 05:02:41 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.ja.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/edu-cases-argentina-ecen.ja.html 31 Jul 2020 03:03:44 -0000
1.32
+++ education/edu-cases-argentina-ecen.ja.html 10 Nov 2020 17:37:27 -0000
1.33
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
ãã®æ
å ±ã¯ãECENã®å°å¦æ ¡æ師 Debora Badilla Huento
ãæ稿ããå
±åã®æç²ã§ãã彼女ã®ç®èº«ã¯ãèªç±ã½ããã¦ã§ã¢ã¸ã®é¢å¿ãé«ããããã«å¦æ
¡ã«ãããå®å
¨ç§»è¡ã«ã¨ã£ã¦éè¦ãªå½¹å²ãæããã¾ããã</p>
+</blockquote>
<div class="article">
<h3>æå¨å°</h3>
@@ -131,8 +133,10 @@
<p>ç®èº«ã¨å¿èãå¿
è¦ã§ããããä½æ¥ã¯æ¥½ãããã®ã§ãããç¾å¨ãããããã®çµé¨ãåºå
±ããä»ã®æè²ã°ã«ã¼ããæ¯æ´ãããã¨ãã¦ãã¾ãã</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
移è¡ä½æ¥ã«åå ãã
ãã£ããã¹ã¦ã®æ¹ã®ãã°ãããå°½åã«æè¬ãã¾ãã</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -184,7 +188,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.lt.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-cases-argentina-ecen.lt.html 31 May 2020 05:03:07 -0000
1.4
+++ education/edu-cases-argentina-ecen.lt.html 10 Nov 2020 17:37:27 -0000
1.5
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
TolimesnÄ informacija buvo iÅ¡traukta iÅ¡ mums pristatytos ECEN pagrindų
mokytojos Debora Badilla Huento ataskaitos. Jos įsipareigojimas atliko
pagrindinį vaidmenį keliant Laisvos programinÄs įrangos supratimÄ
ir
galiausiai pasiekiant mokyklos migracijÄ
.</p>
+</blockquote>
<div class="article">
<h3>Vieta</h3>
@@ -175,9 +177,11 @@
bendruomenÄms.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Mes norÄtume iÅ¡reikÅ¡ti mÅ«sų dÄkingumÄ
visiems žmonÄms, dalyvavusiems
toje
migracijos pastangoje, už puikiai atliktÄ
darbÄ
.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -235,7 +239,7 @@
<p class="unprintable"><!-- timestamp start -->
Atnaujinta:
-$Date: 2020/05/31 05:03:07 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.pt-br.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-argentina-ecen.pt-br.html 31 May 2020 05:03:35
-0000 1.8
+++ education/edu-cases-argentina-ecen.pt-br.html 10 Nov 2020 17:37:27
-0000 1.9
@@ -48,12 +48,14 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
As informações a seguir foram extraÃdas de um relatório que nos foi
submetido pela professora de ensino primário da ECEN Debora Badilla
Huento. O comprometimento dela representou um papel crÃtico em aumentar a
consciência sobre o Software Livre e, principalmente, fazer com que a escola
migrasse.</p>
+</blockquote>
<div class="article">
<h3>Localização</h3>
@@ -176,9 +178,11 @@
comunidades educacionais.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Nós gostarÃamos de expressar nossa apreciação pelo excelente trabalho feito
a todas as pessoas envolvidas no esforço da migração.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -237,7 +241,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/05/31 05:03:35 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.ru.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-argentina-ecen.ru.html 31 May 2020 05:03:49 -0000
1.5
+++ education/edu-cases-argentina-ecen.ru.html 10 Nov 2020 17:37:27 -0000
1.6
@@ -48,11 +48,13 @@
<div id="last-div" class="reduced-width">
<h2>Ð¥ÑиÑÑианÑÐºÐ°Ñ ÐµÐ²Ð°Ð½Ð³ÐµÐ»Ð¸ÑÑÑÐºÐ°Ñ Ñкола
ÐеÑкена (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐÑа инÑоÑмаÑÐ¸Ñ Ð±Ñла извлеÑена из доклада,
коÑоÑÑй нам пÑедÑÑавила
ÑÑиÑелÑниÑа наÑалÑной ÑÐºÐ¾Ð»Ñ ECEN ÐебоÑа
Ðадилла Ð¥ÑенÑо. Ðе пÑивеÑженноÑÑÑ
идеÑм ÑвободнÑÑ
пÑогÑамм ÑÑгÑала клÑÑевÑÑ
ÑÐ¾Ð»Ñ Ð² ознакомлении обÑеÑÑва Ñо
ÑвободнÑми пÑогÑаммами и в поÑледÑÑÑем
пеÑеÑ
оде ÑÐºÐ¾Ð»Ñ Ð½Ð° ниÑ
.</p>
+</blockquote>
<div class="article">
<h3>ÐеÑÑоположение</h3>
@@ -173,9 +175,11 @@
пÑиобÑеÑеннÑм опÑÑом, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð¼Ð¾ÑÑ Ð´ÑÑгим
обÑазоваÑелÑнÑм ÑообÑеÑÑвам.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
ÐÑ Ñ
оÑели Ð±Ñ Ð²ÑÑазиÑÑ Ð¿ÑизнаÑелÑноÑÑÑ Ð·Ð°
пÑекÑаÑно пÑоделанÑÑ ÑабоÑÑ Ð²Ñем
лÑдÑм, вовлеÑеннÑм в пÑоÑеÑÑ Ð¿ÐµÑеÑ
ода.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -233,7 +237,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/05/31 05:03:49 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.tr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-cases-argentina-ecen.tr.html 31 May 2020 05:04:01 -0000
1.4
+++ education/edu-cases-argentina-ecen.tr.html 10 Nov 2020 17:37:27 -0000
1.5
@@ -48,10 +48,12 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
AÅaÄıdaki bilgiler, ECEN Ä°lkokul ÃÄretmeni Debora Badilla Huento
tarafından
bize sunulan bir rapordan alınmıÅtır. KararlılıÄı Ãzgür Yazılım
bilincini
arttırmada ve nihayetinde okulu göç ettirmede kilit bir rol oynadı.</p>
+</blockquote>
<div class="article">
<h3>Yer</h3>
@@ -167,9 +169,11 @@
topluluklarına yardımcı olmak için öÄrendiklerimizi yayıyoruz.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Göç çabası içerisinde yer alan bütün insanlara, mükemmel çalıÅmalar
için
teÅekkürlerimizi sunarız.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -236,7 +240,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/05/31 05:04:01 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.uk.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/edu-cases-argentina-ecen.uk.html 31 May 2020 05:04:16 -0000
1.7
+++ education/edu-cases-argentina-ecen.uk.html 10 Nov 2020 17:37:27 -0000
1.8
@@ -48,12 +48,14 @@
<div id="last-div" class="reduced-width">
<h2>Ð¥ÑиÑÑиÑнÑÑка ÑвангелÑÑÑка Ñкола
ÐеÑкена (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐаÑÑÑÐ¿Ð½Ñ Ð²ÑдомоÑÑÑ, виÑÑгнÑÑÑ Ð· доповÑдÑ,
ÑÐºÑ Ð½Ð°Ð¼ пÑедÑÑавила вÑиÑелÑка
ECEN ÐебоÑа ÐадÑÐ»Ð»Ñ Ð¥ÑенÑо. ÐÑ Ð¿ÑиÑ
илÑнÑÑÑÑ
зÑгÑала клÑÑÐ¾Ð²Ñ ÑÐ¾Ð»Ñ Ñ
пÑдвиÑÐµÐ½Ð½Ñ Ð¾Ð±ÑзнаноÑÑÑ Ð¿Ñо вÑлÑне
пÑогÑамне забезпеÑÐµÐ½Ð½Ñ Ñ, вÑеÑÑÑ-ÑеÑÑ,
пÑизвела до пеÑеÑ
Ð¾Ð´Ñ Ñколи на
викоÑиÑÑÐ°Ð½Ð½Ñ Ð²ÑлÑного пÑогÑамного
забезпеÑеннÑ.</p>
+</blockquote>
<div class="article">
<h3>РозÑаÑÑваннÑ</h3>
@@ -172,9 +174,11 @@
навÑалÑним закладам.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Ðи Ñ
оÑÑли б виÑловиÑи наÑÑ Ð²Ð´ÑÑнÑÑÑÑ Ð·Ð°
вÑдмÑнно Ð²Ð¸ÐºÐ¾Ð½Ð°Ð½Ñ ÑобоÑÑ Ð²ÑÑм лÑдÑм,
ÑÐºÑ Ð±Ñли залÑÑÐµÐ½Ñ Ñ Ð¿ÑоÑÐµÑ Ð¼ÑгÑаÑÑÑ.</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -231,7 +235,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2020/05/31 05:04:16 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-argentina-ecen.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-argentina-ecen.zh-cn.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/edu-cases-argentina-ecen.zh-cn.html 31 May 2020 05:04:34
-0000 1.2
+++ education/edu-cases-argentina-ecen.zh-cn.html 10 Nov 2020 17:37:27
-0000 1.3
@@ -47,9 +47,11 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
以ä¸ä¿¡æ¯æèªä¸ä»½ç±ECENå°å¦æå¸Debora Badilla
Huentoæ交ç»æ们çæ¥åã她çåªå对èªç±è½¯ä»¶çæ¨å¹¿èµ·äºå
³é®ä½ç¨ï¼ä»èæç»ä½¿è¯¥å¦æ ¡è½¬åèªç±è½¯ä»¶ã</p>
+</blockquote>
<div class="article">
<h3>å°ç¹</h3>
@@ -129,8 +131,10 @@
<p>è½ç¶å®éè¦å¥ç®ååé§ï¼æ´ä¸ªè¿ç¨è¿æ¯ä»¤äººææ¦çãç°å¨æ们ä¼
ææ们æå¦ï¼ä»¥å¸®å©å
¶ä»æè²ç¤¾åºã</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
æ们æè°¢ææå¨æ¤è¿ç§»è¿ç¨ä¸ååºåªåç人ï¼ä½
们çå·¥ä½æ¯åè¶çã</p>
+</blockquote>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -182,7 +186,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/05/31 05:04:34 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.ar.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ar.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-india-ambedkar.ar.html 31 May 2020 05:01:00 -0000
1.5
+++ education/edu-cases-india-ambedkar.ar.html 10 Nov 2020 17:37:27 -0000
1.6
@@ -47,9 +47,11 @@
<div id="last-div" class="reduced-width">
<h2>Ù
رÙز Ø£Ù
بÙدÙار اﻻجتÙ
اع٠ÙÙØÙسبة (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
اÙÙ
عÙÙÙ
ات اÙتاÙÙØ© تÙ
إرساÙÙا Ø¥ÙÙÙا Ù
Ù Ùب٠Ù
جÙ
Ùعة Ù
٠اÙÙ
تطÙعÙ٠اÙØ°ÙÙ ÙعÙ
ÙÙÙ
باÙÙ
رÙز.</p>
+</blockquote>
<div class="article">
<h3>Ù
ÙÙع اÙÙ
رÙز</h3>
@@ -125,12 +127,14 @@
اﻷثر ÙÙ Ù
ساعدتÙÙ
عÙÙ Ù
تابعة Ù
ÙرراتÙÙ
اÙÙ
درسÙØ© ÙاÙÙØ¬Ø§Ø ÙÙÙا بصÙرة Ù
رضÙØ©.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
ÙØÙ ÙعÙÙ
بأ٠اÙÙ
جÙÙدات اÙجبارة ÙÙ
تطÙعÙ
اÙبرÙ
جÙات اÙØرة ÙÙ Ùذ٠اÙÙ
ÙاطÙ
اÙÙ
ØرÙÙ
Ø© Ù
٠اÙÙ
دÙÙØ© تزداد ÙÙÙ
ا٠بعد ÙÙÙ
Ø ÙÙ
ا تظÙر ÙتائجÙا بصÙرة ÙاضØØ©. إذا
ÙÙت ترغب باÙÙ
شارÙØ© ÙÙ Ùذا اÙعÙ
ÙØ Ø£Ù ÙÙت
ترغب باÙتبرع بأجÙزة ØاسÙب Ù
ØÙ
ÙÙØ©Ø
Ùرج٠اÙتÙاص٠Ù
عÙا عÙ٠اÙبرÙد اﻻÙÙترÙÙÙ <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>اÙصÙرة عÙÙ Ùذ٠اÙصÙØØ© Ù
رخصة بÙ
Ùجب <a
rel="license"
@@ -197,7 +201,7 @@
<p class="unprintable"><!-- timestamp start -->
تÙ
اÙتØدÙØ« ÙÙ:
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.de.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- education/edu-cases-india-ambedkar.de.html 31 May 2020 05:01:40 -0000
1.53
+++ education/edu-cases-india-ambedkar.de.html 10 Nov 2020 17:37:27 -0000
1.54
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
Die folgenden Informationen stammen von ehrenamtlichen Mitarbeitern des
Centers.</p>
+</blockquote>
<div class="article">
<h3>Standort</h3>
@@ -132,12 +134,14 @@
abzuschlieÃen.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Wir wurden darüber informiert, dass die herausragenden Leistungen
ehrenamtlicher Freie-Software-Helfer in Brennpunkten der Stadt mit
bemerkenswerten Ergebnissen expandiert. Wenn Sie dazu beitragen oder dieser
Gruppe Notebooks spenden möchten, kontaktieren Sie uns bitte unter <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>Das Bild in diesem Dokument ist lizenziert unter einer <a rel="license"
@@ -205,7 +209,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2020/05/31 05:01:40 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.el.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-ambedkar.el.html 31 May 2020 05:01:14 -0000
1.9
+++ education/edu-cases-india-ambedkar.el.html 10 Nov 2020 17:37:27 -0000
1.10
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>ÎÎνÏÏο ΠληÏοÏοÏÎ¹ÎºÎ®Ï ÏÎ·Ï ÎοινÏÏηÏÎ±Ï Ambedkar
(AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
Îι ÏαÏακάÏÏ ÏληÏοÏοÏÎ¯ÎµÏ Î¼Î±Ï ÏαÏαÏÏÏήθηκαν
αÏÏ Ïην ομάδα εθελονÏÏν ÏοÏ
εÏγάζονÏαι ÏÏο ÎÎνÏÏο.</p>
+</blockquote>
<div class="article">
<h3>ΤοÏοθεÏία</h3>
@@ -134,12 +136,14 @@
ÏαÏακολοÏ
θήÏοÏ
ν και να ÏεÏάÏοÏ
ν με εÏιÏÏ
Ïία κι εκείνα Ïα μαθήμαÏα.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
ÎαθαίνοÏ
με ÏÏι οι εξαιÏεÏικÎÏ ÏÏοÏÏάθειεÏ
ÏÏν εθελονÏÏν ÏοÏ
ÎλεÏθεÏοÏ
ÎογιÏÎ¼Î¹ÎºÎ¿Ï Î´Î¹ÎµÏ
ÏÏνονÏαι Ïε αÏ
ÏÎÏ ÏÎ¹Ï Ï
ÏοβαθμιÏμÎÎ½ÎµÏ ÏεÏιοÏÎÏ ÏÎ·Ï ÏÏληÏ, με
αξιοÏημείÏÏα αÏοÏελÎÏμαÏα. Îν θα θÎλαÏε να
ÏÏ
νειÏÏÎÏεÏε ή να δÏÏίÏεÏε
ÏοÏηÏοÏÏ Ï
ÏολογιÏÏÎÏ Ïε αÏ
Ïή Ïην ομάδα,
ÏαÏÎ±ÎºÎ±Î»Ï ÎµÎ»Î¬Ïε Ïε εÏαÏή μαζί Î¼Î±Ï ÏÏο
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>ΠεικÏνα Ïε αÏ
Ïή Ïη Ïελίδα ÏαÏÎÏεÏαι Ï
ÏÏ
Ïην άδεια CC-BY-SA, <a
@@ -210,7 +214,7 @@
<p class="unprintable"><!-- timestamp start -->
ÎνημεÏÏθηκε:
-$Date: 2020/05/31 05:01:14 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.es.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/edu-cases-india-ambedkar.es.html 31 May 2020 05:01:00 -0000
1.18
+++ education/edu-cases-india-ambedkar.es.html 10 Nov 2020 17:37:27 -0000
1.19
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Centro de Computación Comunitario de Ambedkar (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
La siguiente información nos fue enviada por el grupo de voluntarios que
trabajan en el Centro.</p>
+</blockquote>
<div class="article">
<h3>Ubicación</h3>
@@ -131,12 +133,14 @@
éxito.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Nos informan que el excepcional esfuerzo de los voluntarios del software
libre se está extendiendo por estas zonas marginadas de la ciudad con
resultados notables. Si desea contribuir o donar portátiles a este grupo,
por favor póngase en contacto con <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>La imagen que aparece en esta página se publica bajo la licencia CC-BY-SA,
@@ -203,7 +207,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/05/31 05:01:00 $
+$Date: 2020/11/10 17:37:27 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.fr.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/edu-cases-india-ambedkar.fr.html 5 Oct 2020 13:13:17 -0000
1.41
+++ education/edu-cases-india-ambedkar.fr.html 10 Nov 2020 17:37:28 -0000
1.42
@@ -49,9 +49,11 @@
<h2>Centre informatique communautaire Ambedkar (<abbr title="Ambedkar Community
Computing Center">AC3</abbr>)</h2>
-<p class="italic">
+<blockquote>
+<p>
L'information donnée ici nous a été soumise par le groupe des bénévoles
qui
travaillent au Centre.</p>
+</blockquote>
<div class="article">
<h3>Situation</h3>
@@ -133,12 +135,14 @@
succès.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
On nous a informé que les bénévoles du logiciel libre sont en train
d'étendre leur action exceptionnelle dans ces quartiers défavorisés de la
ville avec des résultats remarquables. Si vous voulez contribuer ou faire
don de portables à ce groupe, merci de nous contacter à <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>L'illustration de cette page est sous licence CC-BY-SA, <a rel="license"
@@ -203,7 +207,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.hr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/edu-cases-india-ambedkar.hr.html 31 May 2020 05:02:15 -0000
1.18
+++ education/edu-cases-india-ambedkar.hr.html 10 Nov 2020 17:37:28 -0000
1.19
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>RaÄunalni centar zajednice Ambedkar (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
SljedeÄe informacije dostavila nam je grupa volontera koja radi u RaÄunalnom
centru zajednice Ambedkar.</p>
+</blockquote>
<div class="article">
<h3>Lokacija</h3>
@@ -127,12 +129,14 @@
neprocjenjive pomoÄi u pohaÄanju i uspjeÅ¡nom polaganju tih teÄajeva.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Obaviješteni smo da se izvanredan napor volontera slobodnog softvera u ovim
zapostavljenim podruÄjima grada proÅ¡iruje, s rezultatima vrijednima
pažnje. Ukoliko biste željeli doprinijeti ili donirati prijenosna raÄunala
ovoj grupi, molimo javite nam se na <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>Fotografija je licencirana licencom CC-BY-SA, <a rel="license"
@@ -196,7 +200,7 @@
<p class="unprintable"><!-- timestamp start -->
Vrijeme zadnje izmjene:
-$Date: 2020/05/31 05:02:15 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.it.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/edu-cases-india-ambedkar.it.html 31 May 2020 05:02:41 -0000
1.30
+++ education/edu-cases-india-ambedkar.it.html 10 Nov 2020 17:37:28 -0000
1.31
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Centro comunitario di informatica Ambedkar (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
Le informazioni seguenti ci sono state riferite dal gruppo di volontari che
lavora al centro. </p>
+</blockquote>
<div class="article">
<h3>Ubicazione</h3>
@@ -131,11 +133,13 @@
superare questi corsi con successo. </p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Sappiamo che l'eccezionale sforzo dei volontari del software libero si sta
espandendo in queste aree povere della città , con effetti degni di nota. Chi
desidera contribuire a donare un computer a questo gruppo può contattarci a
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>La foto in questa pagina è distribuita sotto la licenza CC-BY-SA, <a
@@ -202,7 +206,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2020/05/31 05:02:41 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ja.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-cases-india-ambedkar.ja.html 31 Jul 2020 03:03:44 -0000
1.38
+++ education/edu-cases-india-ambedkar.ja.html 10 Nov 2020 17:37:28 -0000
1.39
@@ -47,8 +47,10 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
ä¸è¨ã®æ
å
±ã¯ãã»ã³ã¿ã¼ã§æ´»åãããã©ã³ãã£ã¢ã°ã«ã¼ãããå¯ãããã¾ããã</p>
+</blockquote>
<div class="article">
<h3>æå¨å°</h3>
@@ -102,9 +104,11 @@
<p>ã»ã³ã¿ã¼ã®è¬ç¾©ã«åºã¦ããåä¾ã®ä¸ã«ã¯ãå¦æ
¡ã§ã³ã³ãã¥ã¼ã¿ã®ææ¥ãåãã¦ããåä¾ããã¾ããããããåä¾ãã¡ã¯ãã»ã³ã¿ã¼ã§ç¿ãã¹ãã«ãå¦æ
¡ã§ã®ææ¥ãããªãã®ã«ã¨ã¦ãå½¹ç«ã£ã¦ããã®ã
ã¨è¨ã£ã¦ãã¾ãã</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
èªç±ã½ããã¦ã§ã¢ãã©ã³ãã£ã¢ã«ãããã°ãããåªåããã®ãããªæµã¾ããªãå°åã¸æ³¨ããã¦ãããè¦äºãªææãããã¦ãããã¨ã®ãã¨ã§ãããã®ã°ã«ã¼ããæä¼ãããããããã¯ã©ããããããå¯ä»ãããå
´åã«ã¯ã<a
href="mailto:education@gnu.org"><education@gnu.org></a>ã¾ã§ãé£çµ¡ãã
ããã</p>
+</blockquote>
<div class="infobox">
<p>ãã®ãã¼ã¸ã®ç»åã¯CC-BY-SA <a rel="license"
@@ -162,7 +166,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.lt.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/edu-cases-india-ambedkar.lt.html 31 May 2020 05:03:07 -0000
1.7
+++ education/edu-cases-india-ambedkar.lt.html 10 Nov 2020 17:37:28 -0000
1.8
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar bendruomenÄs kompiuterijos centras (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
Toliau pateikta informacija mums buvo pristatyta tame Centre dirbanÄių
savanorių grupÄs.</p>
+</blockquote>
<div class="article">
<h3>Vieta</h3>
@@ -132,12 +134,14 @@
jiems yra neįkainojama pagalba sekti ir išlaikyti tuos kursus
sÄkmingai.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Mes esame informuoti, kad Å¡i iÅ¡skirtinÄ Laisvos programinÄs įrangos
savanorių pastanga Å¡iose miesto nepritekliaus teritorijose yra pleÄiama, su
neįtikÄtinais rezultatais. Jei jÅ«s norite prisidÄti ar Å¡iai grupei
paaukoti
nešiojamus kompiuterius, prašome susisiekite su mumis <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>Paveikslas Å¡iame puslapyje yra licencijuotas pagal CC-BY-SA, <a
@@ -202,7 +206,7 @@
<p class="unprintable"><!-- timestamp start -->
Atnaujinta:
-$Date: 2020/05/31 05:03:07 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.pt-br.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-ambedkar.pt-br.html 31 May 2020 05:03:35
-0000 1.8
+++ education/edu-cases-india-ambedkar.pt-br.html 10 Nov 2020 17:37:28
-0000 1.9
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Centro de Computação Comunitária de Ambedkar (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
As informações a seguir nos foram submetidas pelo grupo de voluntários
trabalhando no Centro.</p>
+</blockquote>
<div class="article">
<h3>Localização</h3>
@@ -133,12 +135,14 @@
sucesso.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Nós fomos informados que o esforço impressionante dos voluntários de
Software Livre está expandindo nessas áreas necessitadas da cidade, com
resultados marcantes. Se você gostaria de contribuir ou doar laptops para
esse grupo, por favor nos contate em <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>A imagem nesta página está licenciada sob a CC-BY-SA, a licença <a
@@ -205,7 +209,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/05/31 05:03:35 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.ru.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-ambedkar.ru.html 31 May 2020 05:03:49 -0000
1.9
+++ education/edu-cases-india-ambedkar.ru.html 10 Nov 2020 17:37:28 -0000
1.10
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>ÐмбедкаÑÑкий обÑеÑÑвеннÑй
вÑÑиÑлиÑелÑнÑй ÑенÑÑ (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐÑа инÑоÑмаÑÐ¸Ñ Ð±Ñла пÑедоÑÑавлена нам
гÑÑппой добÑоволÑÑев, ÑабоÑаÑÑиÑ
в
ÑпомÑнÑÑом ÑенÑÑе.</p>
+</blockquote>
<div class="article">
<h3>ÐеÑÑоположение</h3>
@@ -131,12 +133,14 @@
ÑÑпеÑно ÑдаÑÑ ÑкзаменÑ.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Ðам ÑообÑаÑÑ, ÑÑо вÑдаÑÑиеÑÑ ÑÑилиÑ
акÑивиÑÑов ÑвободнÑÑ
пÑогÑамм оÑ
ваÑÑваÑÑ
вÑе болÑÑе беднÑÑ
Ñайонов гоÑода и даÑÑ
замеÑаÑелÑнÑе ÑезÑлÑÑаÑÑ. ÐÑли вÑ
Ñ
оÑиÑе внеÑÑи Ñвой вклад или пожеÑÑвоваÑÑ
ноÑÑбÑк ÑÑой гÑÑппе, пожалÑйÑÑа,
ÑвÑжиÑеÑÑ Ñ Ð½Ð°Ð¼Ð¸ по адÑеÑÑ <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>ÐзобÑажение на ÑÑой ÑÑÑаниÑе доÑÑÑпно по
лиÑензии CC-BY-SA, <a rel="license"
@@ -200,7 +204,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/05/31 05:03:49 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-cases-india-ambedkar.tr.html 31 May 2020 05:04:01 -0000
1.5
+++ education/edu-cases-india-ambedkar.tr.html 10 Nov 2020 17:37:28 -0000
1.6
@@ -48,9 +48,11 @@
<h2>Ambedkar TopluluÄu BiliÅim Merkezi (<abbr title="Ambedkar Community
Computing Center">AC3</abbr>)</h2>
-<p class="italic">
+<blockquote>
+<p>
AÅaÄıdaki bilgiler Merkez'de çalıÅan gönüllü grup tarafından bize
sunulmuÅtur.</p>
+</blockquote>
<div class="article">
<h3>Yer</h3>
@@ -128,12 +130,14 @@
Åekilde takip etmeleri ve geçmeleri için çok deÄerli olduÄunu
söylüyorlar.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Ãzgür Yazılım gönüllülerinin olaÄanüstü çabalarının, kentin bu
yoksul
bölgelerinde kayda deÄer sonuçlarla geniÅlediÄini biliyoruz. Bu gruba
katkıda bulunmak veya dizüstü bilgisayar baÄıÅlamak istiyorsanız
lütfen <a
href="mailto:education@gnu.org"><education@gnu.org></a> adresinden
bize ulaÅın.</p>
+</blockquote>
<div class="infobox">
<p>Bu sayfadaki görüntü; CC-BY-SA, <a rel="license"
@@ -206,7 +210,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/05/31 05:04:01 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.uk.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/edu-cases-india-ambedkar.uk.html 31 May 2020 05:04:16 -0000
1.12
+++ education/edu-cases-india-ambedkar.uk.html 10 Nov 2020 17:37:28 -0000
1.13
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>ÐмбедкаÑÑÑкий гÑомадÑÑкий
обÑиÑлÑвалÑний ÑенÑÑ (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐаÑÑÑпна ÑнÑоÑмаÑÑÑ Ð½Ð°Ð´ÑÑлана нам гÑÑпоÑ
добÑоволÑÑÑв, ÑÐºÑ Ð¿ÑаÑÑÑÑÑ Ñ
ЦенÑÑÑ.</p>
+</blockquote>
<div class="article">
<h3>ÐÑÑÑезнаÑ
одженнÑ</h3>
@@ -131,12 +133,14 @@
неоÑÑÐ½ÐµÐ½Ð½Ñ Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ñ Ñ Ð²ÑдвÑдÑÐ²Ð°Ð½Ð½Ñ Ñа
ÑÑпÑÑного ÑÐºÐ»Ð°Ð´Ð°Ð½Ð½Ñ ÑиÑ
кÑÑÑÑв.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
Ðам повÑдомили, Ñо Ð²Ð°Ð³Ð¾Ð¼Ñ Ð·ÑÑиллÑ
добÑоволÑÑÑв вÑлÑного пÑогÑамного
забезпеÑÐµÐ½Ð½Ñ Ð¿Ð¾ÑиÑÑÑÑÑÑÑ Ð² ÑÑ Ð±ÑднÑ
Ñайони мÑÑÑа з ÑÑдовими
ÑезÑлÑÑаÑами. ЯкÑо ви Ñ
оÑеÑе внеÑÑи ÑвÑй
внеÑок або подаÑÑваÑи ноÑÑбÑки длÑ
ÑÑÑÑ Ð³ÑÑпи, бÑÐ´Ñ Ð»Ð°Ñка, напиÑÑÑÑ Ð½Ð°Ð¼ на <a
href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>ÐобÑÐ°Ð¶ÐµÐ½Ð½Ñ Ð½Ð° ÑÑй ÑÑоÑÑнÑÑ Ð´Ð¾ÑÑÑпне на
ÑмоваÑ
лÑÑензÑÑ CC-BY-SA, <a
@@ -203,7 +207,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2020/05/31 05:04:16 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-ambedkar.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-ambedkar.zh-cn.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-ambedkar.zh-cn.html 31 May 2020 05:04:34
-0000 1.6
+++ education/edu-cases-india-ambedkar.zh-cn.html 10 Nov 2020 17:37:28
-0000 1.7
@@ -47,8 +47,10 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar社åºè®¡ç®ä¸å¿ï¼AC3ï¼</h2>
-<p class="italic">
+<blockquote>
+<p>
以ä¸ä¿¡æ¯æ¯ç±å¨è¯¥è®¡ç®ä¸å¿å·¥ä½çä¸ç»å¿æ¿è
æ交ç»æ们çã</p>
+</blockquote>
<div class="article">
<h3>å°ç¹</h3>
@@ -100,9 +102,11 @@
<p>å
¶ä¸ä¸äºå©åå¨å¦æ ¡ä¹åå
äºè®¡ç®è¯¾ç¨ãä»ä»¬æ±æ¥è¯´å¨ä¸å¿å¦å°çææ¯é常æä»·å¼ï¼å¸®å©ä»ä»¬å¦ä¹
并æåéè¿å¦æ ¡ç课ç¨ã</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
æ们被åç¥å¼äººæ³¨ç®çèªç±è½¯ä»¶å¿æ¿è
æ£å¨è¯¥è´«å°å°åºæ©å±ï¼èä¸æ绩æç¶ãå¦æä½
æ¿æ为该ç»ç»è´¡ç®ææç®ç¬è®°æ¬çµèï¼è¯·éè¿<a
href="mailto:education@gnu.org"><education@gnu.org></a>èç³»æ们ã</p>
+</blockquote>
<div class="infobox">
<p>æ¬é¡µé¢çå¾ç使ç¨CC-BY-SAï¼<a rel="license"
@@ -160,7 +164,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/05/31 05:04:34 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.de.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.de.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- education/edu-cases-india-irimpanam.de.html 25 Jul 2020 20:00:27 -0000
1.59
+++ education/edu-cases-india-irimpanam.de.html 10 Nov 2020 17:37:28 -0000
1.60
@@ -48,8 +48,10 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Die folgenden Informationen stammen von Lehrkräften der Schule.</p>
+</blockquote>
<div class="article">
<h3>Standort</h3>
@@ -298,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.el.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.el.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/edu-cases-india-irimpanam.el.html 25 Jul 2020 20:00:27 -0000
1.13
+++ education/edu-cases-india-irimpanam.el.html 10 Nov 2020 17:37:28 -0000
1.14
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>ÎνÏÏεÏο ÎεÏ
ÏεÏοβάθμιο ÎÏαγγελμαÏικÏ
ΣÏολείο ÏοÏ
Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
ΠακÏλοÏ
θη αναÏοÏά βαÏίζεÏαι Ïε
ÏληÏοÏοÏÎ¯ÎµÏ ÏοÏ
Î¼Î±Ï ÏαÏαÏÏÏηÏε Ïο
ÏÏοÏÏÏικÏ
ÏοÏ
ÏÏολείοÏ
.</p>
+</blockquote>
<div class="article">
<h3>ΤοÏοθεÏία</h3>
@@ -312,7 +314,7 @@
<p class="unprintable"><!-- timestamp start -->
ÎνημεÏÏθηκε:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.es.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.es.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-cases-india-irimpanam.es.html 21 Jun 2020 10:58:50 -0000
1.42
+++ education/edu-cases-india-irimpanam.es.html 10 Nov 2020 17:37:28 -0000
1.43
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Vocacional de Secundaria Superior Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
El siguiente caso está basado en información suministrada por el personal de
la escuela.</p>
+</blockquote>
<div class="article">
<h3>Ubicación</h3>
@@ -293,7 +295,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/21 10:58:50 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.fr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.fr.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- education/edu-cases-india-irimpanam.fr.html 5 Oct 2020 13:13:17 -0000
1.60
+++ education/edu-cases-india-irimpanam.fr.html 10 Nov 2020 17:37:28 -0000
1.61
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Lycée professionnel d'Irimpanam (VHSS Irimpanam)</h2>
-<p class="italic">
+<blockquote>
+<p>
L'article ci-dessous est basé sur les informations que nous a fournies
l'équipe pédagogique de l'école.</p>
+</blockquote>
<div class="article">
<h3>Situation</h3>
@@ -298,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:17 $
+$Date: 2020/11/10 17:37:28 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.hr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.hr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-cases-india-irimpanam.hr.html 25 Jul 2020 20:00:27 -0000
1.21
+++ education/edu-cases-india-irimpanam.hr.html 10 Nov 2020 17:37:29 -0000
1.22
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Strukovna viša srednja škola Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Izvještaj naveden u daljnjem tekstu je temeljen na informacijama dobivenim
od Å¡kolskog osoblja. </p>
+</blockquote>
<div class="article">
<h3>Lokacija</h3>
@@ -289,7 +291,7 @@
<p class="unprintable"><!-- timestamp start -->
Zadnji put promijenjeno:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.it.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.it.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/edu-cases-india-irimpanam.it.html 25 Jul 2020 20:00:27 -0000
1.39
+++ education/edu-cases-india-irimpanam.it.html 10 Nov 2020 17:37:29 -0000
1.40
@@ -47,9 +47,11 @@
<div id="last-div" class="reduced-width">
<h2>Scuola professionale di Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Il seguente resoconto è basato su informazioni forniteci dallo staff della
scuola.</p>
+</blockquote>
<div class="article">
<h3>Ubicazione</h3>
@@ -291,7 +293,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.ja.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ja.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-cases-india-irimpanam.ja.html 31 Jul 2020 03:03:44 -0000
1.42
+++ education/edu-cases-india-irimpanam.ja.html 10 Nov 2020 17:37:29 -0000
1.43
@@ -48,8 +48,10 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
ä¸è¨ã®å ±åã¯å¦æ ¡ã¹ã¿ããããå¯ããããæ
å
±ã«åºã¥ãã¦ãã¾ãã</p>
+</blockquote>
<div class="article">
<h3>æå¨å°</h3>
@@ -215,7 +217,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2020/07/31 03:03:44 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.ko.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ko.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/edu-cases-india-irimpanam.ko.html 25 Jul 2020 20:00:27 -0000
1.13
+++ education/edu-cases-india-irimpanam.ko.html 10 Nov 2020 17:37:29 -0000
1.14
@@ -47,8 +47,10 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
ì´ ë³´ê³ ìë í´ë¹ íêµ ì§ììê²ì ë°ì ì 보를 기ë°ì¼ë¡
ìì±ëììµëë¤. </p>
+</blockquote>
<div class="article">
<h3>ìì¹</h3>
@@ -237,7 +239,7 @@
<p class="unprintable"><!-- timestamp start -->
ìµì¢
ìì ì¼:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.lt.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.lt.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.lt.html 25 Jul 2020 20:00:27 -0000
1.8
+++ education/edu-cases-india-irimpanam.lt.html 10 Nov 2020 17:37:29 -0000
1.9
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>ProfesinÄ aukÅ¡tesnioji pagrindinÄ mokykla Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Toliau pateikta ataskaita yra paremta mokyklos darbuotojų suteikta
informacija.</p>
+</blockquote>
<div class="article">
<h3>Vieta</h3>
@@ -296,7 +298,7 @@
<p class="unprintable"><!-- timestamp start -->
Atnaujinta:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.ml.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ml.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-irimpanam.ml.html 10 Jul 2020 13:59:53 -0000
1.6
+++ education/edu-cases-india-irimpanam.ml.html 10 Nov 2020 17:37:29 -0000
1.7
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>à´µàµà´àµà´àµà´·à´¨à´²àµâ ഹയരàµâ
à´¸àµà´àµà´à´£àµà´à´±à´¿ à´¸àµà´àµà´³àµâ
à´à´°à´¿à´®àµà´ªà´¨à´</h2>
-<p class="italic">
+<blockquote>
+<p>
താഴൠà´àµà´àµà´¤àµà´¤à´¿à´°à´¿à´àµà´àµà´¨àµà´¨
റിപàµà´ªàµà´°àµâà´àµà´àµ à´
വിദàµà´¯à´¾à´²à´¯à´¤àµà´¤à´¿à´²àµ à´¸àµà´±àµà´±à´¾à´«àµ തനàµà´¨
വിവരà´àµà´à´³àµ à´
à´à´¿à´¸àµà´¥à´¾à´¨à´®à´¾à´àµà´à´¿
à´à´³àµà´³à´¤à´¾à´£àµ.</p>
+</blockquote>
<div class="article">
<h3>à´¸àµà´¥à´¾à´¨à´</h3>
@@ -306,7 +308,7 @@
<p class="unprintable"><!-- timestamp start -->
à´ªàµà´¤àµà´àµà´à´¿à´¯à´¤àµàµ:
-$Date: 2020/07/10 13:59:53 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.nl.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.nl.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.nl.html 22 Jun 2020 10:01:51 -0000
1.8
+++ education/edu-cases-india-irimpanam.nl.html 10 Nov 2020 17:37:29 -0000
1.9
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Hogere middelbare school voor beroepsonderwijs Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Het volgende verslag is gebaseerd op informatie verstrekt door het
schoolpersoneel.</p>
+</blockquote>
<div class="article">
<h3>Locatie</h3>
@@ -292,7 +294,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2020/06/22 10:01:51 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.pl.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.pl.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-cases-india-irimpanam.pl.html 22 Jun 2020 12:02:44 -0000
1.10
+++ education/edu-cases-india-irimpanam.pl.html 10 Nov 2020 17:37:29 -0000
1.11
@@ -47,9 +47,11 @@
<div id="last-div" class="reduced-width">
<h2>Zawodowa SzkoÅa w Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
Poniższy artykuÅ opiera siÄ na informacjach dostarczonych przez
personel szkoÅy.</p>
+</blockquote>
<div class="article">
<h3>Lokalizacja</h3>
@@ -309,7 +311,7 @@
<p class="unprintable"><!-- timestamp start -->
Aktualizowane:
-$Date: 2020/06/22 12:02:44 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.pt-br.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-cases-india-irimpanam.pt-br.html 22 Jun 2020 13:01:13
-0000 1.9
+++ education/edu-cases-india-irimpanam.pt-br.html 10 Nov 2020 17:37:29
-0000 1.10
@@ -48,9 +48,11 @@
<div id="last-div" class="reduced-width">
<h2>Escola de Ensino Profissionalizante de Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
O relatório a seguir baseou-se na informação que nos foi fornecida pela
equipe da escola.</p>
+</blockquote>
<div class="article">
<h3>Local</h3>
@@ -291,7 +293,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/06/22 13:01:13 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.ru.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/edu-cases-india-irimpanam.ru.html 20 Jun 2020 19:58:48 -0000
1.11
+++ education/edu-cases-india-irimpanam.ru.html 10 Nov 2020 17:37:29 -0000
1.12
@@ -48,8 +48,10 @@
<div id="last-div" class="reduced-width">
<h2>ÐÑÑмпанамÑкое ÑÑаÑÑее ÑÑеднее
пÑоÑеÑÑионалÑное ÑÑилиÑе</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐаннÑй оÑÑÐµÑ Ð¾Ñнован на инÑоÑмаÑии,
пÑедоÑÑавленной ÑоÑÑÑдниками ÑÑилиÑа.</p>
+</blockquote>
<div class="article">
<h3>ÐеÑÑоÑаÑположение</h3>
@@ -290,7 +292,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/20 19:58:48 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.tr.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.tr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/edu-cases-india-irimpanam.tr.html 21 Jun 2020 07:59:07 -0000
1.6
+++ education/edu-cases-india-irimpanam.tr.html 10 Nov 2020 17:37:29 -0000
1.7
@@ -47,9 +47,11 @@
<div id="last-div" class="reduced-width">
<h2>Irimpanam Mesleki Okulu</h2>
-<p class="italic">
+<blockquote>
+<p>
AÅaÄıdaki rapor, okul personeli tarafından bize verilen bilgilere
dayanmaktadır.</p>
+</blockquote>
<div class="article">
<h3>Yer</h3>
@@ -289,7 +291,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/06/21 07:59:07 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.uk.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.uk.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/edu-cases-india-irimpanam.uk.html 25 Jul 2020 20:00:27 -0000
1.15
+++ education/edu-cases-india-irimpanam.uk.html 10 Nov 2020 17:37:29 -0000
1.16
@@ -48,8 +48,10 @@
<div id="last-div" class="reduced-width">
<h2>ÐÑÑмпанамÑÑка ÑÑÑна виÑа ÑеÑеднÑ
Ñкола</h2>
-<p class="italic">
+<blockquote>
+<p>
ÐаÑÑÑпний звÑÑ Ð±Ð°Ð·ÑÑÑÑÑÑ Ð½Ð° ÑнÑоÑмаÑÑÑ,
наданÑй нам пÑаÑÑвниками Ñколи.</p>
+</blockquote>
<div class="article">
<h3>ÐÑÑÑезнаÑ
одженнÑ</h3>
@@ -289,7 +291,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2020/07/25 20:00:27 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-cases-india-irimpanam.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.zh-cn.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-cases-india-irimpanam.zh-cn.html 21 Jun 2020 02:29:15
-0000 1.8
+++ education/edu-cases-india-irimpanam.zh-cn.html 10 Nov 2020 17:37:29
-0000 1.9
@@ -47,8 +47,10 @@
<div id="last-div" class="reduced-width">
<h2>Irimpanamé«çº§èä¸ä¸å¦</h2>
-<p class="italic">
+<blockquote>
+<p>
ä¸è¿°æ¥åæ ¹æ®è¯¥ä¸å¦æèå工为æ们æä¾çä¿¡æ¯å®æã</p>
+</blockquote>
<div class="article">
<h3>å°ç¹</h3>
@@ -213,7 +215,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/06/21 02:29:15 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.ar.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ar.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/edu-schools.ar.html 6 Oct 2020 08:41:56 -0000 1.35
+++ education/edu-schools.ar.html 10 Nov 2020 17:37:29 -0000 1.36
@@ -42,12 +42,13 @@
بÙÙÙ
<a href="http://www.stallman.org/">رÙتشارد ستÙÙÙ
اÙ</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
عÙ٠اÙØ£Ùشطة اÙتعÙÙÙ
ÙØ©Ø Ù
تضÙ
ÙØ© اÙÙ
دارس Ù
Ù
جÙ
Ùع اÙÙ
راØÙØ Ø£Ù Ù
٠رÙاض اÙأطÙاÙ
Øت٠اÙجاÙ
Ø¹Ø©Ø Ø£Ù ØªÙ
تÙÙ ÙاجبÙا أخÙاÙÙÙا
Ùتدرس <a
href="/education/education.html">اÙبراÙ
ج اÙØرة ÙÙØ·.</a></p>
-<p class="italic">عÙ٠جÙ
Ùع Ù
ستخدÙ
٠اÙÙÙÙ
بÙÙتر <a
+<p>عÙ٠جÙ
Ùع Ù
ستخدÙ
٠اÙÙÙÙ
بÙÙتر <a
href="/philosophy/free-software-even-more-important.html">اÙاصرار عÙÙ
اÙبرÙ
جÙات اÙØرÙØ©</a>Ø ÙÙ٠تÙ
ÙØ Ø§ÙÙ
ستخدÙ
ÙÙ
اÙØرÙÙØ© Ù٠اÙتØÙÙ
ÙÙ
ÙÙÙ
بÙÙتراتÙÙ
—Ø£Ù
ا Ù
ع اÙبرÙ
جÙات
اÙاØتÙارÙØ©Ø ÙÙع٠اÙبرÙاÙ
ج Ù
ا ÙرÙد Ù
اÙÙÙ
@@ -55,6 +56,7 @@
اÙÙ
ستخدÙ
Ù٠اÙØرÙÙØ© ÙÙتعاÙÙÙا Ù
ع بعضÙÙ
اÙبعض ÙÙعÙØ´Ùا ØÙاة ÙÙÙئة. Ùذ٠اÙأسباب
تÙطب٠عÙ٠اÙÙ
دارس ÙÙ
ا تÙطب٠عÙÙ ÙÙ Ùرد.
ÙÙÙÙ Ù
ÙضÙع Ùذا اÙÙ
Ùا٠Ù٠عرض اÙأسباب
اÙإضاÙÙØ© اÙت٠تÙطب٠عÙ٠اÙتعÙÙÙ
خاصة.</p>
+</blockquote>
<div class="column-limit"></div>
<p>ÙÙ
ÙÙ ÙÙبرÙ
جÙات اÙØرÙØ© أ٠تØاÙظ عÙ٠أÙ
ÙاÙ
اÙÙ
Ø¯Ø§Ø±Ø³Ø ÙÙÙÙ ÙØ°Ù Ùائدة ثاÙÙÙØ©. ØÙظ
@@ -201,7 +203,7 @@
<p class="unprintable"><!-- timestamp start -->
ØÙدÙثت بتارÙØ®:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.ca.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ca.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- education/edu-schools.ca.html 6 Oct 2020 08:41:56 -0000 1.28
+++ education/edu-schools.ca.html 10 Nov 2020 17:37:29 -0000 1.29
@@ -42,12 +42,13 @@
per <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Tota tasca educativa (incloent-hi la de les escoles, des de les guarderies
fins a la universitat) té el deure moral de <a
href="/education/education.html">ensenyar només programari lliure.</a></p>
-<p class="italic">Tots els usuaris d'ordinadors haurien d'<a
+<p>Tots els usuaris d'ordinadors haurien d'<a
href="/philosophy/free-software-even-more-important.html"> insistir en el
programari lliure</a>: proporciona als usuaris la llibertat de controlar els
seus propis ordinadors—amb programari privatiu, l'ordinador fa el que
@@ -56,6 +57,7 @@
entre ells i portar una vida honesta. Aquestes raons poden aplicar-se a les
escoles igual que les apliquem als usuaris. El propòsit d'aquest article és
afegir raons que s'apliquen especÃficament a l'educació.</p>
+</blockquote>
<div class="column-limit"></div>
<p>El programari lliure pot ajudar les escoles a estalviar diners, però aquest
@@ -221,7 +223,7 @@
<p class="unprintable"><!-- timestamp start -->
Updated:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.de.html
===================================================================
RCS file: /web/www/www/education/edu-schools.de.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- education/edu-schools.de.html 6 Oct 2020 08:41:56 -0000 1.47
+++ education/edu-schools.de.html 10 Nov 2020 17:37:29 -0000 1.48
@@ -42,12 +42,13 @@
von <a href="//www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Pädagogische Einrichtungen (einschlieÃlich Schulen aller Stufen von
Vorschule bis Universität) haben eine moralische Verpflichtung <a
href="/education/">nur Freie Software zu lehren</a>.</p>
-<p class="italic"><span class="intro">Alle Rechnernutzer sollten <a
+<p><span class="intro">Alle Rechnernutzer sollten <a
href="/philosophy/free-software-even-more-important.html">auf Freie Software
bestehen</a>: sie gibt Nutzern die Freiheit, ihre eigenen Rechner zu
kontrollieren ‑ mit proprietärer Software macht das Programm
@@ -56,6 +57,7 @@
zusammenzuarbeiten, ein aufrechtes Leben zu führen. Diese Gründe gelten für
Schulen wie für jeden Einzelnen. Dieser Artikel soll weitere Gründe nennen,
die im Besonderen für den Bereich Bildung gelten.</span></p>
+</blockquote>
<div class="column-limit"></div>
<p>Freie Software kann Schulen Geld einsparen, aber das ist nur ein
@@ -270,7 +272,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.es.html
===================================================================
RCS file: /web/www/www/education/edu-schools.es.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- education/edu-schools.es.html 6 Oct 2020 08:41:56 -0000 1.45
+++ education/edu-schools.es.html 10 Nov 2020 17:37:29 -0000 1.46
@@ -42,13 +42,14 @@
por <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Las actividades relacionadas con la educación (incluidas las escuelas de
todos los niveles, desde preescolar hasta la universidad) tienen <a
href="/education/education.html">el deber moral de enseñar únicamente
software libre</a>.</p>
-<p class="italic">Todos los usuarios de ordenadores deben <a
+<p>Todos los usuarios de ordenadores deben <a
href="/philosophy/free-software-even-more-important.html">insistir en que el
software sea libre</a>: el software libre otorga a los usuarios la libertad
de controlar sus propios ordenadores; con el software privativo, en cambio,
@@ -58,6 +59,7 @@
se aplican tanto a las escuelas como a cualquier persona, aunque el
propósito de este artÃculo es plantear los motivos adicionales que interesan
especÃficamente a la educación.</p>
+</blockquote>
<div class="column-limit"></div>
<p>El software libre supone un ahorro económico para las escuelas, pero este
es
@@ -231,7 +233,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.fr.html
===================================================================
RCS file: /web/www/www/education/edu-schools.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- education/edu-schools.fr.html 6 Oct 2020 08:41:56 -0000 1.54
+++ education/edu-schools.fr.html 10 Nov 2020 17:37:29 -0000 1.55
@@ -42,13 +42,14 @@
par <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Les activités liées à l'éducation, y compris les écoles depuis le jardin
d'enfants jusqu'à l'université, ont pour <a
href="/education/education.html">devoir moral de n'enseigner que le logiciel
libre</a>.</p>
-<p class="italic">Tout utilisateur d'informatique devrait <a
+<p>Tout utilisateur d'informatique devrait <a
href="/philosophy/free-software-even-more-important.html">exiger des
logiciels libres</a> car ils lui donnent la possibilité de contrôler son
propre ordinateur â avec les logiciels privateurs en effet,<a
@@ -59,6 +60,7 @@
raisons s'appliquent aux écoles comme à tout le monde. Toutefois, le but de
cet article est de présenter les arguments supplémentaires qui s'appliquent
spécifiquement à l'éducation.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Le logiciel libre fait économiser de l'argent aux écoles, mais c'est un
@@ -234,7 +236,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.it.html
===================================================================
RCS file: /web/www/www/education/edu-schools.it.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/edu-schools.it.html 6 Oct 2020 08:41:56 -0000 1.32
+++ education/edu-schools.it.html 10 Nov 2020 17:37:29 -0000 1.33
@@ -42,12 +42,13 @@
di <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Le istituzioni didattiche in genere, dalla scuola materna all'università ,
hanno il dovere morale di <a href="/education/education.html">insegnare solo
il software libero</a>.</p>
-<p class="italic">Tutti gli utenti informatici devono <a
+<p>Tutti gli utenti informatici devono <a
href="/philosophy/free-software-even-more-important.html">insistere con il
software libero</a>: esso offre agli utenti la libertà di poter controllare
il proprio computer; con il software proprietario il programma fa quanto
@@ -57,6 +58,7 @@
qualsiasi altro soggetto. Lo scopo di questo articolo è di evidenziare le
caratteristiche che si applicano in modo specifico al settore
dell'istruzione.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Il software libero consente alle scuole di risparmiare, anche se questo è
un
@@ -226,7 +228,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:29 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.ja.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ja.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- education/edu-schools.ja.html 6 Oct 2020 08:41:56 -0000 1.37
+++ education/edu-schools.ja.html 10 Nov 2020 17:37:30 -0000 1.38
@@ -41,12 +41,14 @@
<a
href="http://www.stallman.org/">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è</address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
æè²æ´»å(å¹¼ç¨åãã大å¦ã¾ã§ã®ãã¹ã¦ã®æ®µéã®å¦æ
¡ãå«ã)ã«ã¯<a
href="/education/education.html">èªç±ãªã½ããã¦ã§ã¢ã
ããæãã</a>éå¾³ç義åãããã¾ãã</p>
-<p class="italic">ãã¹ã¦ã®ã³ã³ãã¥ã¼ã¿ã®ã¦ã¼ã¶ã¯<a
+<p>ãã¹ã¦ã®ã³ã³ãã¥ã¼ã¿ã®ã¦ã¼ã¶ã¯<a
href="/philosophy/free-software-even-more-important.html">èªç±ãªã½ããã¦ã§ã¢ãå¼·ã主張ãã¹ãã§ã</a>:èªç±ãªã½ããã¦ã§ã¢ã¯ã¦ã¼ã¶ãèªåã®ã³ã³ãã¥ã¼ã¿ãã³ã³ããã¼ã«ããèªç±ãä¸ãã¦ããã¾ã—ãããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã§ã¯ãã³ã³ãã¥ã¼ã¿ã¯ã½ããã¦ã§ã¢ã®ææè
ãããã¯éçºè
ã欲ãããã¨ãå®è¡ããããã¯å¿
ãããã¦ã¼ã¶ãå®è¡ããããã¨ã¨åãã¨ã¯éãã¾ãããèªç±ãªã½ããã¦ã§ã¢ã¯ã¾ããã¦ã¼ã¶ããäºãã«ååããã¾ã£ãããªçæ´»ãéãããã®èªç±ãä¸ãã¦ããã¾ããããããéçã¯ãä¸äººã«ããã§ããããã«ãå¦æ
¡ã«å¯¾ãã¦ããã¦ã¯ã¾ãã¾ããããã®æç«
ã®ç®çã¯ãã¨ãã«æè²ã«ã¤ãã¦ãã¦ã¯ã¾ã追å
ã®çç±ãè¿°ã¹ããã¨ã§ãã</p>
+</blockquote>
<div class="column-limit"></div>
<p>èªç±ãªã½ããã¦ã§ã¢ã«ããå¦æ
¡ã®çµè²»ãç¯ç´ãããã¨ãã§ãã¾ãããããã¯äºç¾©çãªãã®ã§ããç¯ç´ãå¯è½ãªã®ã¯ãèªç±ãªã½ããã¦ã§ã¢ã¯ä»ã®ã¦ã¼ã¶ã¨åæ§ã«å¦æ
¡ã«å¯¾ãã¦ãã½ããã¦ã§ã¢ã®è¤è£½ãåé
å¸ãè¡ãèªç±ãä¸ãã¦ãããããã§ãããã®ãããå¦æ
¡ã·ã¹ãã ã§ã¯ã³ãã¼ããã¹ã¦ã®å¦æ
¡ã«ä¸ãããã¨ãã§ããããããã®å¦æ
¡ã§ã¯ããããããã¨ã«ãããæ¯æã義åãªããããã°ã©ã
ããã¹ã¦ã®ã³ã³ãã¥ã¼ã¿ã«ã¤ã³ã¹ãã¼ã«ãããã¨ãã§ãã¾ãã</p>
@@ -145,7 +147,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.lt.html
===================================================================
RCS file: /web/www/www/education/edu-schools.lt.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-schools.lt.html 6 Oct 2020 08:41:56 -0000 1.8
+++ education/edu-schools.lt.html 10 Nov 2020 17:37:30 -0000 1.9
@@ -42,12 +42,13 @@
Pagal <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Å vietÄjiÅ¡kos veiklos, įskaitant visų lygių – nuo darželio iki
universiteto, mokyklas, turi moralinÄ pareigÄ
<a
href="/education/education.html">mokyti tik laisvÄ
programinÄ Ä¯rangÄ
.</a></p>
-<p class="italic">Visi kompiuterių naudotojai turi <a
+<p>Visi kompiuterių naudotojai turi <a
href="/philosophy/free-software-even-more-important.html">reikalauti laisvos
programinÄs įrangos</a>: ji naudotojams suteikia laisvÄ kontroliuoti jų
paÄių kompiuterius – su nuosavybine programine įranga, programa daro
@@ -57,6 +58,7 @@
Å ios priežastys taikytinos mokykloms, kaip ir visiems kitiems. TaÄiau, Å¡io
straipsnio tikslas yra pateikti papildomas priežastis, kurios taikytinos
konkreÄiai Å¡vietimui.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Laisva programinÄ Ä¯ranga gali mokykloms sutaupyti pinigų, bet tai yra
@@ -228,7 +230,7 @@
<p class="unprintable"><!-- timestamp start -->
Atnaujinta:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.ml.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ml.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/edu-schools.ml.html 6 Oct 2020 08:41:56 -0000 1.30
+++ education/edu-schools.ml.html 10 Nov 2020 17:37:30 -0000 1.31
@@ -42,13 +42,14 @@
à´à´´àµà´¤à´¿à´¯à´¤àµàµ <a
href="http://www.stallman.org/">റിà´àµà´à´¾à´°àµâà´¡àµ
à´¸àµà´±àµà´±à´¾à´³àµâമാനàµâ</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
à´¨àµà´´àµà´¸à´±à´¿ à´¤àµà´àµà´àµ സർവà´à´²à´¾à´¶à´¾à´² വരàµ
à´àµ¾à´ªàµà´ªàµà´àµà´¨àµà´¨ à´à´²àµà´²à´¾
തലà´àµà´à´³à´¿à´²àµà´®àµà´³àµà´³
വിദàµà´¯à´¾à´²à´¯à´àµà´àµ¾à´àµà´àµà´,
വിദàµà´¯à´¾à´àµà´¯à´¾à´¸à´ªà´°à´®à´¾à´¯
à´ªàµà´°à´µà´°àµâà´¤àµà´¤à´¨à´àµà´à´³àµâà´àµà´à´¾à´¯à´¿ <a
href="/education/education.html">à´¸àµà´µà´¤à´¨àµà´¤àµà´°à´¸àµà´«àµà´±àµà´±àµâà´µàµà´¯à´°àµâ
മാതàµà´°à´
പഠിപàµà´ªà´¿à´àµà´à´¾à´¨àµà´³àµà´³</a>
ധാരàµâà´®àµà´®à´¿à´à´®à´¾à´¯ à´à´°àµâà´¤àµà´¤à´µàµà´¯à´
à´à´£àµà´àµ.</p>
-<p class="italic">à´à´²àµà´²à´¾ à´à´®àµà´ªàµà´¯àµà´àµà´à´°àµâ
à´à´ªà´¯àµà´àµà´¤à´¾à´àµà´à´³àµà´ <a
+<p>à´à´²àµà´²à´¾ à´à´®àµà´ªàµà´¯àµà´àµà´à´°àµâ
à´à´ªà´¯àµà´àµà´¤à´¾à´àµà´à´³àµà´ <a
href="/philosophy/free-software-even-more-important.html">
à´¸àµà´µà´¤à´¨àµà´¤àµà´°à´¸àµà´«àµà´±àµà´±àµâà´µàµà´¯à´°àµâ
നിർബനàµà´§à´®à´¾à´¯àµà´
à´à´ªà´¯àµà´à´¿à´àµà´àµà´£àµà´à´¤à´¿à´¨àµàµ</a>
à´ªàµà´¤àµà´µà´¾à´¯ à´à´¿à´²
à´à´¾à´°à´£à´àµà´à´³àµà´£àµà´àµàµ. à´
à´¤àµàµ
à´à´ªà´¯àµà´àµà´¤à´¾à´àµà´à´³àµâà´àµà´àµàµ à´¸àµà´µà´¨àµà´¤à´
à´à´®àµà´ªàµà´¯àµà´àµà´à´°àµâ
@@ -60,6 +61,7 @@
പറà´àµà´à´¤àµà´²àµà´²à´¾à´
à´à´µà´°àµâà´àµà´àµà´®àµà´¨àµà´¨à´ªàµà´²àµ
വിദàµà´¯à´¾à´²à´¯à´àµà´à´³àµâà´àµà´àµà´
ബാധà´à´®à´¾à´£àµàµ. à´à´¨àµà´¤à´¿à´°àµà´¨àµà´¨à´¾à´²àµà´,
à´àµà´¤àµà´¯à´®à´¾à´¯à´¿ വിദàµà´¯à´¾à´àµà´¯à´¾à´¸
à´®àµà´à´²à´¯àµ à´¸à´à´¬à´¨àµà´§à´¿à´àµà´àµà´¨àµà´¨
à´àµà´àµà´¤àµ½ à´à´¾à´°à´£à´àµà´àµ¾ നലàµâà´àµà´
à´à´¨àµà´¨à´¤à´¾à´£àµ à´ à´ªàµà´°à´¬à´¨àµà´§à´¤àµà´¤à´¿à´¨àµà´±àµ
à´à´¦àµà´¦àµà´¶àµà´¯à´.</p>
+</blockquote>
<div class="column-limit"></div>
<p>വിദàµà´¯à´¾à´²à´¯à´àµà´à´³àµà´àµ പണà´
ലാà´à´¿à´àµà´à´¾àµ»
à´¸àµà´µà´¤à´¨àµà´¤àµà´°à´¸àµà´«àµà´±àµà´±àµâà´µàµà´¯à´±à´¿à´¨àµ
à´à´´à´¿à´¯àµà´, à´ªà´àµà´·àµ à´à´¤àµ
@@ -266,7 +268,7 @@
<p class="unprintable"><!-- timestamp start -->
à´ªàµà´¤àµà´àµà´à´¿à´¯à´¤àµàµ:
-$Date: 2020/10/06 08:41:56 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.nl.html
===================================================================
RCS file: /web/www/www/education/edu-schools.nl.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-schools.nl.html 6 Oct 2020 08:41:57 -0000 1.21
+++ education/edu-schools.nl.html 10 Nov 2020 17:37:30 -0000 1.22
@@ -42,12 +42,13 @@
door <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Onderwijsinstellingen, van basisschool tot universiteit, hebben een <a
href="/education/education.html">morele verplichting alleen vrije software
te onderwijzen</a>.</p>
-<p class="italic">Alle computergebruikers zouden moeten <a
+<p>Alle computergebruikers zouden moeten <a
href="/philosophy/free-software-even-more-important.html"> aandringen op het
gebruik van vrije software</a>: het geeft gebruikers de vrijheid om controle
te hebben over hun eigen computers—met niet-vrije software doet het
@@ -56,6 +57,7 @@
werken en een fatsoenlijk leven te leiden. Deze redenen gelden voor
iedereen, dus ook voor scholen. Dit artikel concentreert zich op argumenten
die specifiek gelden voor het onderwijs.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Allereerst kan vrije software scholen geld besparen, maar dit is
@@ -223,7 +225,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.pl.html
===================================================================
RCS file: /web/www/www/education/edu-schools.pl.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- education/edu-schools.pl.html 6 Oct 2020 08:41:57 -0000 1.26
+++ education/edu-schools.pl.html 10 Nov 2020 17:37:30 -0000 1.27
@@ -42,12 +42,13 @@
<a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
DziaÅalnoÅci edukacyjne, w tym również szkoÅy, majÄ
obowiÄ
zek
moralny
aby <a href="/education/education.html">nauczaÄ wyÅÄ
cznie
na wolnym oprogramowaniu.</a></p>
-<p class="italic">Każdy użytkownik komputera powinien <a
+<p>Każdy użytkownik komputera powinien <a
href="/philosophy/free-software-even-more-important.html">nalegaÄ
na używanie wolnego oprogramowania</a>: daje ono użytkownikom
możliwoÅÄ
kontrolowania ich wÅasnych komputerów – przy oprogramowaniu
@@ -57,6 +58,7 @@
prowadzenia uczciwego stylu użycia. To dotyczy wszystkich, nie tylko
w szkoÅach. Ten artykuÅ przedstawia dlaczego to jest szczególnie ważne
w przypadku szkóÅ.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Wolne oprogramowanie pozwala zaoszczÄdziÄ szkoÅom mnóstwo pieniÄdzy,
@@ -239,7 +241,7 @@
<p class="unprintable"><!-- timestamp start -->
Aktualizowane:
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-schools.pt-br.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/edu-schools.pt-br.html 6 Oct 2020 08:41:57 -0000 1.38
+++ education/edu-schools.pt-br.html 10 Nov 2020 17:37:30 -0000 1.39
@@ -42,12 +42,13 @@
por <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Atividades educacionais, incluindo escolas de todos os nÃveis desde a
pré-escola até a universidade, têm o dever moral de <a
href="/education/education.html">ensinar apenas software livre</a>.</p>
-<p class="italic">Todos os usuários de computadores devem <a
+<p>Todos os usuários de computadores devem <a
href="/philosophy/free-software-even-more-important.html">insistir em
software livre</a>: ele dá aos usuários a liberdade de controlar seus
próprios computadores—com software proprietário, o programa faz o que
@@ -56,6 +57,7 @@
vida com retidão. Essas razões se aplicam às escolas, assim como a qualquer
pessoa. Porém, o propósito deste artigo é expor razões adicionais que se
aplicam especificamente à educação.</p>
+</blockquote>
<div class="column-limit"></div>
<p>O software livre pode poupar dinheiro à s escolas, mas este é um benefÃcio
@@ -236,7 +238,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/10/06 08:41:57 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.ru.html
===================================================================
RCS file: /web/www/www/education/edu-schools.ru.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/edu-schools.ru.html 6 Oct 2020 08:42:01 -0000 1.42
+++ education/edu-schools.ru.html 10 Nov 2020 17:37:30 -0000 1.43
@@ -42,12 +42,13 @@
<a href="http://www.stallman.org/">РиÑаÑд СÑолмен</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
ÐбÑазоваÑелÑнÑе ÑÑÑеждениÑ, в Ñом ÑиÑле
ÑÑебнÑе Ð·Ð°Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð²ÑеÑ
ÑÑовней оÑ
деÑÑкиÑ
Ñадов до вÑзов, обÑÐ·Ð°Ð½Ñ <a
href="/education/education.html">пÑеподаваÑÑ ÑолÑко
ÑвободнÑе пÑогÑаммÑ</a>.</p>
-<p class="italic">ÐÑе полÑзоваÑели компÑÑÑеÑов
Ð´Ð¾Ð»Ð¶Ð½Ñ <a
+<p>ÐÑе полÑзоваÑели компÑÑÑеÑов Ð´Ð¾Ð»Ð¶Ð½Ñ <a
href="/philosophy/free-software-even-more-important.html">наÑÑаиваÑÑ
на
ÑвободнÑÑ
пÑогÑаммаÑ
</a>: они даÑÑ
полÑзоваÑелÑм ÑÐ²Ð¾Ð±Ð¾Ð´Ñ ÐºÐ¾Ð½ÑÑолиÑоваÑÑ Ñвои
компÑÑÑеÑÑ — когда пÑогÑамма
неÑвободна, она Ð´ÐµÐ»Ð°ÐµÑ Ñо, Ñего
@@ -56,6 +57,7 @@
дÑÑгом, веÑÑи ÑеÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ. ÐÑи аÑгÑменÑÑ
пÑÐ¸Ð¼ÐµÐ½Ð¸Ð¼Ñ Ðº к ÑÑебнÑм заведениÑм
Ñак же, как и ко вÑем. Ðднако ÑÐµÐ»Ñ ÑÑой
ÑÑаÑÑи — пÑедÑÑавиÑÑ
дополниÑелÑнÑе доводÑ, коÑоÑÑе пÑименимÑ
именно к ÑÑеÑе обÑазованиÑ.</p>
+</blockquote>
<div class="column-limit"></div>
<p>СвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¼Ð¾Ð³ÑÑ ÑбеÑеÑÑ
ÑÑÐµÐ±Ð½Ð¾Ð¼Ñ Ð·Ð°Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð´ÐµÐ½Ñги, но ÑÑо
@@ -228,7 +230,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.sq.html
===================================================================
RCS file: /web/www/www/education/edu-schools.sq.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- education/edu-schools.sq.html 6 Oct 2020 08:42:01 -0000 1.19
+++ education/edu-schools.sq.html 10 Nov 2020 17:37:30 -0000 1.20
@@ -42,12 +42,13 @@
nga <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Veprimtaritë arsimore, përfshi shkollat e të gjitha niveleve, nga kopshtet
deri në universitete, kanë një detyrim moral <a
href="/education/education.html">të japin mësim vetëm software të
lirë.</a></p>
-<p class="italic">Krejt përdoruesit e kompjuterit do të duhej <a
+<p>Krejt përdoruesit e kompjuterit do të duhej <a
href="/philosophy/free-software-even-more-important.html"> të ngulnin këmbë
në software-in e lirë</a>: ai u jep përdoruesve lirinë për të kontrolluar
kompjuterin e tyre — me software-in pronësor, kompjuteri bën atë çka
@@ -56,6 +57,7 @@
me njëri-tjetrin, për të rrojtur një jetë të drejtë. Këto arsye kanë
vlerë
për shkollat, ashtu si për këdo tjetër. Megjithatë, qëllimi i këtij
artikulli është të paraqesë arsyet shtesë që prekin posaçërisht
arsimin.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Software-i i lirë mund tâi kursejë shkollës para, por ky është
vetëm një
@@ -223,7 +225,7 @@
<p class="unprintable"><!-- timestamp start -->
U përditësua më:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.tr.html
===================================================================
RCS file: /web/www/www/education/edu-schools.tr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-schools.tr.html 6 Oct 2020 08:42:01 -0000 1.10
+++ education/edu-schools.tr.html 10 Nov 2020 17:37:30 -0000 1.11
@@ -42,12 +42,13 @@
yazan <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Ana okulundan üniversiteye bütün okul düzeylerini içeren eÄitim
faaliyetleri, <a href="/education/education.html">sadece özgür yazılımı
öÄretmek gibi ahlaki bir göreve sahiptir.</a></p>
-<p class="italic">Tüm bilgisayar kullanıcıları kendilerine
bilgisayarlarını denetleme
+<p>Tüm bilgisayar kullanıcıları kendilerine bilgisayarlarını denetleme
özgürlüÄünü saÄlayan <a
href="/philosophy/free-software-even-more-important.html">özgür yazılım
konusunda ısrar etmelidir</a>. Ãzel mülkiyet yazılıma sahip bilgisayarlar,
@@ -56,6 +57,7 @@
kurma özgürlüÄü tanır, doÄru bir yaÅam olanaÄı sunar. Bu nedenler,
herkes
için olduÄu gibi okullar için de geçerlidir. Bununla birlikte bu yazının
amacı, eÄitime özgü ek nedenleri sunmaktır.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Ãzgür yazılım okulların paralarının ceplerinde kalmasını saÄlar,
ancak bu
@@ -236,7 +238,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.uk.html
===================================================================
RCS file: /web/www/www/education/edu-schools.uk.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/edu-schools.uk.html 6 Oct 2020 08:42:01 -0000 1.15
+++ education/edu-schools.uk.html 10 Nov 2020 17:37:30 -0000 1.16
@@ -42,12 +42,13 @@
<a href="http://www.stallman.org/">Ð ÑÑаÑд СÑолмен</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
ÐÑвÑÑÐ½Ñ ÑÑÑанови, в ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ Ð½Ð°Ð²ÑалÑнÑ
заклади ÑÑÑÑ
ÑÑвнÑв вÑд диÑÑадоÑка
до ÑнÑвеÑÑиÑеÑÑ Ð¼Ð¾ÑалÑно <a
href="/education/education.html">зобов'ÑзанÑ
викладаÑи ÑÑлÑки вÑлÑÐ½Ñ Ð¿ÑогÑами.</a> </p>
-<p class="italic">УÑÑ ÐºÐ¾ÑиÑÑÑваÑÑ ÐºÐ¾Ð¼Ð¿'ÑÑеÑÑв
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ <a
+<p>УÑÑ ÐºÐ¾ÑиÑÑÑваÑÑ ÐºÐ¾Ð¼Ð¿'ÑÑеÑÑв Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ <a
href="/philosophy/free-software-even-more-important.html">наполÑгаÑи
на
вÑлÑниÑ
пÑогÑамаÑ
</a>: вони даÑÑÑ
коÑиÑÑÑваÑам ÑÐ²Ð¾Ð±Ð¾Ð´Ñ ÐºÐ¾Ð½ÑÑолÑваÑи ÑвоÑ
комп'ÑÑеÑи — коли пÑогÑама невÑлÑна,
вона ÑобиÑÑ Ñе, Ñого Ñ
оÑе ÑÑ
@@ -56,6 +57,7 @@
жиÑÑÑ. Ð¦Ñ Ð°ÑгÑменÑи заÑÑоÑÐ¾Ð²Ð½Ñ Ð´Ð¾
навÑалÑниÑ
закладÑв Ñак Ñамо, Ñк Ñ Ð´Ð¾
кожного з наÑ. Ðднак меÑа ÑÑÑÑ
ÑÑаÑÑÑ Ð¿Ð¾Ð´Ð°Ñи додаÑÐºÐ¾Ð²Ñ Ð´Ð¾ÐºÐ°Ð·Ð¸,
ÑÐºÑ Ð·Ð°ÑÑоÑовÑÑÑÑÑÑ Ñаме до ÑÑеÑи оÑвÑÑи. </p>
+</blockquote>
<div class="column-limit"></div>
<p>Ðо-пеÑÑе, вÑлÑÐ½Ñ Ð¿ÑогÑами можÑÑÑ
збеÑегÑи навÑалÑного Ð·Ð°ÐºÐ»Ð°Ð´Ñ Ð³ÑоÑÑ, але Ñе
@@ -219,7 +221,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-schools.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-schools.zh-cn.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-schools.zh-cn.html 6 Oct 2020 08:42:01 -0000 1.4
+++ education/edu-schools.zh-cn.html 10 Nov 2020 17:37:30 -0000 1.5
@@ -41,11 +41,13 @@
<a href="http://www.stallman.org/">Richard Stallman</a> è</address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
æè²æ´»å¨ï¼å
æ¬ä»å¹¼å¿åå°å¤§å¦çå级å¦æ ¡ï¼æéå¾·èè´£<a
href="/education/education.html">åªææèªç±è½¯ä»¶ã</a></p>
-<p class="italic">ææ计ç®æºç¨æ·é½åºè¯¥<a
+<p>ææ计ç®æºç¨æ·é½åºè¯¥<a
href="/philosophy/free-software-even-more-important.html">åæ使ç¨èªç±è½¯ä»¶</a>ï¼å®èµäºç¨æ·æ§å¶å
¶è®¡ç®çèªç±—ä¸å±è½¯ä»¶ï¼æ§è¡çæ¯å
¶ææè
æå¼åè
çææ¿ï¼èä¸æ¯å
¶ç¨æ·çææ¿ãèªç±è½¯ä»¶è¿èµäºç¨æ·äºç¸åä½çèªç±ï¼è¿å°±æ¯è¯ä¿¡ççæ´»ãè¿äºéçåæ
·éç¨äºå¦æ
¡ãä¸è¿ï¼æ¬æçç®çæ¯å±ç¤ºç¹å«é对æè²çä¸äºéçã</p>
+</blockquote>
<div class="column-limit"></div>
<p>èªç±è½¯ä»¶å¯ä»¥ä¸ºå¦æ ¡çé±ï¼ä½è¿åªæ¯æ¬¡è¦ç好å¤ãå
为å¦æ ¡åå
¶ä»ç¨æ·ä¸æ
·ï¼æèªç±å¤å¶åéæ°åå¸èªç±è½¯ä»¶ï¼æ以å¯ä»¥çé±ï¼ä¸ä¸ªå¦æ
¡å¯ä»¥ç»å
¶ä»å¦æ ¡è½¯ä»¶æ·è´ï¼è¿æ ·ææå¦æ
¡ç计ç®æºé½å¯ä»¥å®è£
èªç±è½¯ä»¶èä¸å¿
å æ¤ä»è´¹ã</p>
@@ -144,7 +146,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.es.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.es.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- education/edu-software-gimp.es.html 1 Aug 2020 09:29:14 -0000 1.1
+++ education/edu-software-gimp.es.html 10 Nov 2020 17:37:30 -0000 1.2
@@ -82,7 +82,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">su
trabajo</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>«Es un programa que utilizo para diferentes tareas: edición de fotos
(mezcla
de imágenes), dibujos (mis 'fragmentos digitales' con relación a mis
'fragmentos reales' hechos en papel), enseñar a adolescentes, preparar
@@ -147,7 +147,7 @@
<p>En el momento de escribir este artÃculo (marzo de 2012), Mani es estudiante
de ciencias computacionales en Bangalore. Ãl dice:</p>
-<blockquote class="italic">
+<blockquote>
<p> «En primer lugar quiero dar las gracias al movimiento del software libre,
que me permitió empezar a aprender a utilizar GIMP. Fue mi primer logro en
la vida, y vendà muchos cuadros en una conferencia de software
@@ -165,7 +165,7 @@
<p>Richard Stallman comenta acerca de este caso:</p>
-<blockquote class="italic">
+<blockquote>
<p>«Estoy más orgulloso de que GNU haya sido adoptado por los dalits de la
India que de su uso en grandes corporaciones.»</p>
</blockquote>
@@ -217,7 +217,7 @@
<p>Isabel Saij explica por qué decidió liberarse de esa trampa usando
software
libre:</p>
-<blockquote class="italic">
+<blockquote>
<p> «Con los programas privativos, el artista queda a merced de la compañÃa
que
desarrolla el software. A principios de 2003, yo solÃa usar LiveMotion para
diseñar mis trabajos en 2D y 3D con piezas interactivas. Más adelante, ese
@@ -327,7 +327,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/08/01 09:29:14 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.fr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- education/edu-software-gimp.fr.html 5 Oct 2020 13:13:19 -0000 1.49
+++ education/edu-software-gimp.fr.html 10 Nov 2020 17:37:30 -0000 1.50
@@ -85,7 +85,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">son
travail</a>Â :</p>
-<blockquote class="italic">
+<blockquote>
<p>« C'est un programme que j'utilise pour différents travaux : la
manipulation
de photos (mixage d'images), le dessin (mes âfragments numériquesâ, qui
font
le pendant de mes âfragments réelsâ faits sur papier), l'enseignement Ã
des
@@ -150,7 +150,7 @@
<p>Au moment de la rédaction de cet article (mars 2012), Mani était
étudiant en
informatique à Bangalore. Voici ce qu'il dit :</p>
-<blockquote class="italic">
+<blockquote>
<p> « D'abord, je voudrais remercier le mouvement du logiciel libre qui m'a
permis de débuter l'apprentissage de GIMP. Ce fut ma première réussite dans
la vie, et j'ai vendu beaucoup de tableaux à un congrès sur le logiciel
@@ -168,7 +168,7 @@
<p>Voici les commentaires de Richard Stallman sur ce cas :</p>
-<blockquote class="italic">
+<blockquote>
<p>« Je suis plus fier de l'adoption de GNU par les Indiens Dalits que de son
utilisation par des entreprises célèbres. »</p>
</blockquote>
@@ -224,7 +224,7 @@
<p>Isabel Saij explique pourquoi elle a décidé de se libérer de ce piège en
adoptant le logiciel libre :</p>
-<blockquote class="italic">
+<blockquote>
<p> « Avec les programmes privateurs, l'artiste est à la merci de la
société qui
développe le programme. Début 2003 j'utilisais LiveMotion pour créer mes
Åuvres numériques en 2D et 3D avec des éléments interactifs. Plus tard
cette
@@ -346,7 +346,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:19 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.hr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.hr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/edu-software-gimp.hr.html 29 Jun 2020 11:32:40 -0000 1.21
+++ education/edu-software-gimp.hr.html 10 Nov 2020 17:37:30 -0000 1.22
@@ -81,7 +81,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">svojem
radu</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“To je program koji koristim za razliÄite poslove: obradu fotografija
(spajanje slika), crteža (mojih ‘digitalnih isjeÄaka’ s mojim
‘stvarnim isjeÄcima’ koji su napravljeni na papiru), pouku
@@ -143,7 +143,7 @@
<p>U vrijeme pisanja ovog teksta (ožujak 2012.) Mani je student raÄunalnih
znanosti u Bangaloreu. On kaže:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Prvo moram zahvaliti pokretu za slobodan softver koji mi je
omoguÄio
da zapoÄnem s uÄenjem GIMP-a. To je bilo moje prvo postignuÄe u životu i
prodao sam mnogo slika na konferenciji o slobodnom softveru. Kasnije sam
@@ -159,7 +159,7 @@
<p>Komentar Richarda Stallmana o ovom primjeru:</p>
-<blockquote class="italic">
+<blockquote>
<p>“Ponosniji sam na to Å¡to su GNU usvojili indijski Daliti, nego na to
Å¡to ga koriste Äuvene korporacije.”</p>
</blockquote>
@@ -206,7 +206,7 @@
<p>Isabel Saij objaÅ¡njava zaÅ¡to je odluÄila osloboditi se iz te stupice
prihvaÄanjem slobodnog softvera:</p>
-<blockquote class="italic">
+<blockquote>
<p> “S vlasniÄkim programima umjetnik je na milosti kompanije koja
razvija
softver. PoÄetkom 2003. godine koristila sam LiveMotion da bih dizajnirala
svoja 2D i 3D djela s interaktivnim dijelovima. Kasnije te godine kompanija
@@ -316,7 +316,7 @@
<p class="unprintable"><!-- timestamp start -->
Vrijeme zadnje izmjene:
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.it.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/edu-software-gimp.it.html 29 Jun 2020 11:32:40 -0000 1.10
+++ education/edu-software-gimp.it.html 10 Nov 2020 17:37:30 -0000 1.11
@@ -81,7 +81,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">il
suo lavoro</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“GIMP è un programma che uso per diversi lavori: fotoritocco
(combinare più immagini), disegni (i miei ‘frammenti digitali’,
la versione non cartacea dei miei ‘frammenti reali’),
@@ -145,7 +145,7 @@
<p>Al momento della pubblicazione (marzo 2012), Mani studia informatica a
Bangalore. Dice:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Innanzitutto, vorrei ringraziare il movimento del software libero,
senza il quale non avrei potuto imparare GIMP. Ã stato il mio primo
successo, ho venduto molti dipinti ad una conferenza del software libero e
@@ -162,7 +162,7 @@
<p>Il commento di Richard Stallman su questo caso:</p>
-<blockquote class="italic">
+<blockquote>
<p>“Provo più orgoglio per l'adozione di GNU da parte dei paria indiani
che per il suo uso da parte di illustri aziende.”</p>
</blockquote>
@@ -212,7 +212,7 @@
<p>Isabel Saij spiega perché ha deciso di liberarsi dalla trappola adottando
il
software libero:</p>
-<blockquote class="italic">
+<blockquote>
<p> “I programmi proprietari rendono l'artista succube delle società di
sviluppo. All'inizio del 2003 ho usato LiveMotion per aggiungere
interattività ai miei lavori digitali bi e tri-dimensionali. Più tardi,
@@ -327,7 +327,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.ja.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.ja.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- education/edu-software-gimp.ja.html 30 Jun 2020 22:29:55 -0000 1.17
+++ education/edu-software-gimp.ja.html 10 Nov 2020 17:37:30 -0000 1.18
@@ -66,7 +66,7 @@
<p>ãã©ã³ã¹ã®è¸è¡å®¶ã¤ã¶ãã«ã»ã»ã¤ã¸(Isabel Saij)ããã¯<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">彼女ã®ä½å</a>ãä½ãéã«ã©ã®ããã«GIMPã使ã£ã¦ãããã説æãã¦ãã¾ãã
</p>
-<blockquote class="italic">
+<blockquote>
<p>ããããã¯ãã®ããã°ã©ã
ãè¤æ°ã®ç°ãªãç¨éã«ä½¿ã£ã¦ãã¾ããåçã®å¦ç(ç»åã®åæ)ãããã¼ã¤ã³ã°(ãã£ã¸ã¿ã«ãªç´
æãç´ä¸ã®ç´ æã¨çµã¿åããã)ã10代ã®è¥è
ã«æããããã®æºåã¨ãã¦åç»åãç¨æãããªã©ãå¥ã®è¨èã§è¨ãã°ããããã®ãæ°ã«å
¥ãã®ããã°ã©ã ã®ä¸ã¤ã§ããã</p>
</blockquote>
@@ -107,13 +107,13 @@
<!-- /#mani-movie -->
<p>ãã®æç«
ãæ¸ãããå½æ(2012å¹´3æ)ãããã¯ãã³ã¬ãã¼ã«ã§ã³ã³ãã¥ã¼ã¿ã»ãµã¤ã¨ã³ã¹ã®å¦çã§ãããæ°ã:</p>
-<blockquote class="italic">
+<blockquote>
<p>
ãæåã«ãGIMPãå¦ç¿ãããã¨ãããããã¦ãããèªç±ã½ããã¦ã§ã¢éåã«æè¬ã®æã表ãããã¨æãã¾ããããã¯äººçã®ä¸ã§ãããã®æåã®æåã§ãããå¤ãã®çµµãèªç±ã½ããã¦ã§ã¢ã»ã«ã³ãã¡ã¬ã³ã¹ã§å£²ããã¨ãã§ãã¾ããããã®å¾ããããã¯å¤ãã®ã«ã³ãã¡ã¬ã³ã¹ã§èªåã®ä½åãå±ç¤ºããããã«ãªãã¾ãããGIMPã®ãããã§ããããã®çµµç»ã®æè½ã¯ä¸çã¸ã¨åºããã¾ããããåç¥ã®ã¨ãããããããã¡ã®æè½ã¯é常ãä¸çããç¡è¦ããã¦ãã¾ãããã®ã³ãã¥ããã£ã«ãããããããã¡ã®ç®çã¯ãã½ããã¦ã§ã¢ã¨ç¥èãå
±æãããäºãã«æããããèªç±ã½ããã¦ã§ã¢ã®å«çç価å¤ãæ¨é²ããèªç±ã軽ããã社ä¼ç°å¢ã«å¯¾ãã¦ãã½ããã¦ã§ã¢ã®èªç±ã®éè¦æ§ã«æ°ä»ãããã³ã³ãã¥ã¼ã¿ã®ç¥èã«ãã£ã¦è²§è
ã«åãä¸ãããã¨ã§ããããããã
¡ã¯ã¯ãã®ã¢ãã«ãã¾ãã¦ãããããã¨èãã¾ããããããã¡ã¯ããã®å°åã®ã»ãã®ã¹ã©ã
è¡ã§ãæ¢ã«3ã¤ã®ã³ã³ãã¥ã¼ã¿ã»ã»ã³ã¿ã稼åããã¦ãã¾ããã
</p>
</blockquote>
<p>ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³ã®ãã®ä»¶ã«ã¤ãã¦ã®ã³ã¡ã³ã:</p>
-<blockquote class="italic">
+<blockquote>
<p>ããããã¯GNUãèåãªä¼æ¥ã§ã¯ãªããã¤ã³ãã®ä¸å¯è§¦æ°ã«æ¡ç¨ããããã¨ã«èªããæã£ã¦ãã¾ããã</p>
</blockquote>
@@ -130,7 +130,7 @@
<p>ã¤ã¶ãã«ã»ã»ã¤ã¸ããã¯ãã©ã®ããã«ãã¦ãã®ç½
ããéããããã«èªç±ã½ããã¦ã§ã¢ãæ¡ç¨ãã決å®ãããã®ãã説æãã¾ãã</p>
-<blockquote class="italic">
+<blockquote>
<p> ããããã©ã¤ã¨ã¿ãªãªããã°ã©ã
ã«ãã£ã¦ãã¢ã¼ãã£ã¹ãã¯ããã®ã½ããã¦ã§ã¢éçºä¼ç¤¾ã«ããããã¨ã«ãªãã¾ãã2003å¹´åé
ããããã¯LiveMotionã使ããã¤ã³ã¿ã©ã¯ãã£ãã¢ã¼ãã®2Dã¨3Dã®ä½åããã¶ã¤ã³ãã¦ã¾ãããåå¹´ãã®å¾ãéçºä¼ç¤¾ã¯ãã®è£½åã®ä¸æ¢ã決å®ãããããã¯ãã®ã½ããã¦ã§ã¢ã®ãµãã¼ãããåãæ®ããã¾ãããèªåã®ãéãè²»ãããæéã使ã£ã¦ä½¿ãæ¹ãå¦ç¿ããã½ããã¦ã§ã¢ã§ããããããã«ããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢éçºè
ãæ°ããæ©è½ã®è¿½å ã決å®ãããã³ã«æ´æ°ãè³¼å
¥ããªããã°ãªããããã°ãã°ããã¯ææ°ã®ãããã©ã¤ã¨ã¿ãªãªãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ã
ãã§ããåããªãã®ã§ããã¾ã£ããæãã®ãªãæªå¾ªç°ã«ã¯ã¾ãè¾¼ãã§ãã¾ããèç«ãããããã©ããããã¨ãã§ãã¾ãããèªç±ã½ããã¦ã§
ã¢ã§ããã°ãã³ãã¥ããã£ã¯å¸¸ã«ã³ã¼ãã«ã¢ã¯ã»ã¹ãããã¨ãã§ããã®ã§ãåªããããã¸ã§ã¯ãã¯æ»ã¬ãã¨ãããã¾ããã誰ãããããã®ã½ããã¦ã§ã¢ã®éçºãç¶ç¶ãããã¨ãå¯è½ã§ããã</p>
</blockquote>
@@ -197,7 +197,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2020/06/30 22:29:55 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.pt-br.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.pt-br.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/edu-software-gimp.pt-br.html 29 Jun 2020 11:32:40 -0000
1.9
+++ education/edu-software-gimp.pt-br.html 10 Nov 2020 17:37:30 -0000
1.10
@@ -81,7 +81,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">seu
trabalho</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>âà um programa que utilizo para diferentes trabalhos: manipulação de
fotos
(mistura de imagens), desenhos (meus âfragmentos digitaisâ em relação aos
meus âfragmentos reaisâ feitos em papel), ensino para adolescentes,
@@ -144,7 +144,7 @@
<p>No momento da escrita desse artigo (março de 2012), Mani é um estudante de
Ciência da Computação em Bangalore. Ele diz:</p>
-<blockquote class="italic">
+<blockquote>
<p> âPrimeiro eu preciso dizer obrigado ao movimento software livre, o qual
me
permitiu começar a aprender o GIMP. Foi minha primeira conquista na vida, e
eu vendi muitas pinturas em uma conferência de Software Livre. Mais tarde,
@@ -161,7 +161,7 @@
<p>Comentário do Richard Stallman neste caso:</p>
-<blockquote class="italic">
+<blockquote>
<p>âEu estou mais orgulhoso que o GNU tenha sido adotado pelos dalits
indianos,
do que de seu uso por corporações famosas.â</p>
</blockquote>
@@ -213,7 +213,7 @@
<p>Isabel Saij explica por que ela decidiu se libertar da armadilha adotando o
Software Livre:</p>
-<blockquote class="italic">
+<blockquote>
<p> âCom programas proprietários, o artista fica à mercê da empresa de
desenvolvimento de software. No inÃcio de 2003, usei o LiveMotion para
projetar meus trabalhos digitais em 2D e 3D com peças interativas. Mais
@@ -326,7 +326,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.tr.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-software-gimp.tr.html 29 Jun 2020 11:32:40 -0000 1.5
+++ education/edu-software-gimp.tr.html 10 Nov 2020 17:37:30 -0000 1.6
@@ -81,7 +81,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">çalıÅması</a>
için GIMP'ı nasıl kullandıÄını anlatıyor:</p>
-<blockquote class="italic">
+<blockquote>
<p>“Farklı iÅler için kullandıÄım bir program: FotoÄraf iÅleme
(görüntüleri bir araya getirme), çizimler (kâÄıt üzerine yapılan
‘gerçek parçalar’ım ile ilgili ‘dijital
@@ -144,7 +144,7 @@
<p>Bu yazı yazılırken (Mart 2012) Mani, Bangalore'de Bilgisayar Bilimi
öÄrencisiydi. Åöyle diyor:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Ãncelikle Ãzgür Yazılım hareketi sayesinde Åunu söylemeliyim
ki GIMP
öÄrenmeye baÅlamama yol açtı. Hayattaki ilk baÅarımdı ve Ãzgür
Yazılım
konferansında birçok resim sattım. Daha sonra çalıÅmalarımı birçok
@@ -160,7 +160,7 @@
<p>Richard Stallman'ın bu durum ile ilgili yorumu:</p>
-<blockquote class="italic">
+<blockquote>
<p>“GNU'nun Hint Dalitler tarafından benimsenmesinden, ünlü Åirketler
tarafından kullanılmasından daha fazla gurur duyuyorum.”</p>
</blockquote>
@@ -207,7 +207,7 @@
<p>Isabel Saij, neden Ãzgür Yazılım'ı benimseyerek tuzaktan kurtulmaya
karar
verdiÄini açıklıyor:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Ãzel mülk programlarla sanatçı, yazılım geliÅtirme
Åirketinin
insafındadır. 2003 yılının baÅlarında etkileÅimli parçalarla dijital
2B ve
3B çalıÅmalarımı tasarlamak için LiveMotion'u kullandım. O yılın
ilerleyen
@@ -326,7 +326,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.uk.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.uk.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/edu-software-gimp.uk.html 29 Jun 2020 11:32:40 -0000 1.8
+++ education/edu-software-gimp.uk.html 10 Nov 2020 17:37:30 -0000 1.9
@@ -80,7 +80,7 @@
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">ÑвоÑÑ
ÑобоÑи</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“Ð¦Ñ Ð¿ÑогÑÐ°Ð¼Ñ Ñ Ð²Ð¸ÐºÐ¾ÑиÑÑовÑÑ Ð´Ð»Ñ ÑÑзниÑ
ÑобÑÑ: ÑедагÑÐ²Ð°Ð½Ð½Ñ ÑвÑÑлин
(змÑÑÑÐ²Ð°Ð½Ð½Ñ Ð·Ð¾Ð±ÑÐ°Ð¶ÐµÐ½Ñ Ñазом), малÑваннÑ
(Ð¼Ð¾Ñ ‘ÑиÑÑÐ¾Ð²Ñ ÑÑагменÑи’
Ñодо мого ‘ÑеалÑного ÑÑагменÑи’
зÑоблено на папеÑÑ), навÑаннÑ
@@ -144,7 +144,7 @@
<p>Ðа ÑÐ°Ñ Ð½Ð°Ð¿Ð¸ÑÐ°Ð½Ð½Ñ (беÑÐµÐ·ÐµÐ½Ñ 2012) ÐÐ°Ð½Ñ Ð±Ñв
ÑÑÑденÑом на комп'ÑÑеÑниÑ
наÑкаÑ
Ñ
ÐангалоÑÑ. ÐÑн Ñказав:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Ðо-пеÑÑе, Ñ Ð¿Ð¾Ð²Ð¸Ð½ÐµÐ½ подÑкÑваÑи ÑÑÑ
Ñ
за вÑлÑне пÑогÑамне
забезпеÑеннÑ. ÐÑн дозволив Ð¼ÐµÐ½Ñ Ð¿Ð¾ÑаÑи
вивÑÐµÐ½Ð½Ñ GIMP. Це бÑло Ð¼Ð¾Ñ Ð¿ÐµÑÑе
доÑÑÐ³Ð½ÐµÐ½Ð½Ñ Ð² жиÑÑÑ, Ñ Ñ Ð¿Ñодав безлÑÑ
каÑÑин на конÑеÑенÑÑÑ Ñз вÑлÑного
@@ -161,7 +161,7 @@
<p>ÐоменÑÐ°Ñ Ð ÑÑаÑда СÑолмена пÑо Ñей
випадок:</p>
-<blockquote class="italic">
+<blockquote>
<p>“Я бÑлÑÑе пиÑаÑÑÑ Ñим, Ñо GNU бÑв
пÑийнÑÑим ÑндÑйÑÑкими далÑÑами нÑж
його викоÑиÑÑаннÑм вÑдомими
коÑпоÑаÑÑÑми.”</p>
</blockquote>
@@ -211,7 +211,7 @@
<p>ÐÐ·Ð°Ð±ÐµÐ»Ñ Saij поÑÑнÑÑ, ÑÐ¾Ð¼Ñ Ð²Ð¾Ð½Ð° виÑÑÑила
виÑваÑиÑÑ Ð· паÑÑки, пÑийнÑвÑи
вÑлÑне пÑогÑамне забезпеÑеннÑ:</p>
-<blockquote class="italic">
+<blockquote>
<p> “Ðз влаÑниÑÑкими пÑогÑамами Ñ
Ñдожник
вÑдданий на милÑÑÑÑ Ð¿ÑогÑами
ÑозÑобника пÑогÑамного забезпеÑеннÑ. Ðа
поÑаÑÐºÑ 2003 ÑÐ¾ÐºÑ Ñ Ð²Ð¸ÐºÐ¾ÑиÑÑовÑвав
LiveMotion Ñ Ð´Ð¸Ð·Ð°Ð¹Ð½Ñ Ð¼Ð¾ÑÑ
ÑиÑÑовиÑ
2D Ñ 3D ÑобÑÑ
Ñз ÑнÑеÑакÑивними
@@ -324,7 +324,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/edu-software-gimp.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-software-gimp.zh-cn.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/edu-software-gimp.zh-cn.html 29 Jun 2020 11:32:40 -0000
1.5
+++ education/edu-software-gimp.zh-cn.html 10 Nov 2020 17:37:30 -0000
1.6
@@ -66,7 +66,7 @@
<p>æ³å½èºæ¯å®¶Isabel Saijæ述她å¦ä½ä½¿ç¨GIMPå®æäº<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">她çä½å</a>ï¼</p>
-<blockquote class="italic">
+<blockquote>
<p>“è¿æ¯ä¸ä¸ªæå¨ä¸åä½åä¸é½ä½¿ç¨çç¨åºï¼ç
§çå¤çï¼å°å¾çæ··åå¨ä¸èµ·ï¼ãç»ç»ï¼åæç¨äºç»çº¸çâå®é
ç»æ¡âç¸å
³èçâæ°åç»æ¡âï¼ã为éå°å¹´è®²è¯¾ã为è§é¢åå¤å¾çççï¼ãæ¢å¥è¯è¯´ï¼è¿æ¯ææç±çç¨åºä¹ä¸ã”</p>
</blockquote>
@@ -106,13 +106,13 @@
<!-- /#mani-movie -->
<p>æ¤ææ°åæ¶ï¼2012å¹´3æï¼Maniæ¯çå
ç½å°çä¸å计ç®æºç§å¦å¦çãä»è¯´éï¼</p>
-<blockquote class="italic">
+<blockquote>
<p> “é¦å
ï¼æè¦å¯¹èªç±è½¯ä»¶è¿å¨è¯´å£°è°¢è°¢ï¼æ¯å®è®©æè½å¤å¼å§å¦ä¹
GIMPãè¿æ¯æçå½ä¸ç第ä¸ä¸ªæå°±ï¼å¹¶ä¸æå¨ä¸æ¬¡èªç±è½¯ä»¶ä¼è®®ä¸ååºäºè®¸å¤ç»ç»ãåæ¥ï¼æå¼å§å¨å¾å¤ä¼è®®ä¸å±ç¤ºæçä½åãå
为GIMPï¼æçç»ç»æèºå¾ä»¥å±ç°ç»ä¸çãå¦ä½
æç¥ï¼æ们çæè½é常为ä¸çæ忽ç¥ãæ们å¨ç¤¾åºçç®æ
æ¯ï¼å享软件åç¥è¯ï¼äºç¸å¦ä¹
ï¼å¼æ¬èªç±è½¯ä»¶çéå¾·ä»·å¼å¹¶å¨è¿ä¸ªè¢«è¾¹ç¼åç社ä¼ç¯å¢ä¸æå软件èªç±ä¹éè¦æ§ç认ç¥åº¦ï¼ç¨è®¡ç®æºç¥è¯èµäºç©·äººåéãæ们è¦å¤å¶æ们çæ
·æ¿ï¼å¨æ¤å°åºçå
¶ä»è´«æ°åºï¼æ们已ç»å¨è¿è¡3æ计ç®ä¸å¿ã” </p>
</blockquote>
<p>Richard Stallman对æ¤æ¡ä¾çè¯ä»·ï¼</p>
-<blockquote class="italic">
+<blockquote>
<p>“æ¯ä¹GNU被èåç大å
¬å¸æç¨ï¼ææ´ä¸ºä¹è¢«å°åº¦è¾¾å©äºº<sup><a
href="#TransNote1">1</a></sup>æç¨èèªè±ªã”</p>
</blockquote>
@@ -130,7 +130,7 @@
<p>Isabel Saij解éäºä¸ºä»ä¹å¥¹å³å®å²ç
´è©ç¯±ï¼æ¥æ±èªç±è½¯ä»¶ï¼</p>
-<blockquote class="italic">
+<blockquote>
<p> “使ç¨ä¸æ软件ï¼èºæ¯å®¶ä»¬å¯¹è½¯ä»¶å¼ååæ
è½ä¸ºåãå¨2003å¹´åï¼æ使ç¨LiveMotionæ¥è®¾è®¡2Då3Dç交äºå¼èºæ¯ä½åãå½å¹´æäºæ¶åï¼è¯¥å
¬å¸å³å®åæ¢è¯¥è½¯ä»¶ï¼å
æ¤æ就被æä¸ï¼æè±è´¹äºæ¶é´åéé±å¦ä¹
使ç¨è¯¥è½¯ä»¶ï¼ä½æ¯ç°å¨æ²¡æäºææ¯æ¯æãæ´æçè
ï¼æ
论ä½æ¶ï¼åªè¦ä¸æ软件å¼åè
å³å®å¼å
¥æ°çåè½ï¼ä½
å°±ä¸å¾ä¸è±é±è´ä¹°é常åªä¼è¿è¡å¨ææ°çä¸ææä½ç³»ç»ä¸çå级çãè¿æ
·ï¼ä½ å°±å®å
¨æ å©å°é·å
¥äºéªæ¶ç循ç¯ä¹ä¸ã令人沮丧ä½åæ
è½ä¸ºåã使ç¨èªç±è½¯ä»¶ï¼ç¤¾åºæ¥æ代ç
ï¼å¥½ç项ç®æ°¸è¿ä¸ä¼æ²¡è½ãæ»æ人ä¼ç»§ç»å¼å该软件ã”</p>
</blockquote>
@@ -199,7 +199,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/06/29 11:32:40 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/remote-education-children-freedom-privacy-at-stake.es.html
===================================================================
RCS file:
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/remote-education-children-freedom-privacy-at-stake.es.html
6 Oct 2020 08:42:01 -0000 1.4
+++ education/remote-education-children-freedom-privacy-at-stake.es.html
10 Nov 2020 17:37:30 -0000 1.5
@@ -269,11 +269,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Las fotos son cortesÃa de Javier Sepúlveda y están bajo licencia <a
rel="license"
href="https://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
Commons Reconocimiento-SinObraDerivada 4.0 Internacional</a>.</p>
+</blockquote>
</div>
<div class="translators-notes">
@@ -344,7 +346,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/remote-education-children-freedom-privacy-at-stake.fr.html
===================================================================
RCS file:
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.fr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/remote-education-children-freedom-privacy-at-stake.fr.html
6 Oct 2020 08:42:01 -0000 1.6
+++ education/remote-education-children-freedom-privacy-at-stake.fr.html
10 Nov 2020 17:37:30 -0000 1.7
@@ -282,11 +282,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Photographies avec l'aimable autorisation de Javier Sepúlveda, sous licence
<a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
attribution, pas de modification, 4.0 internationale</a>.</p>
+</blockquote>
</div>
<div class="translators-notes">
@@ -363,7 +365,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/remote-education-children-freedom-privacy-at-stake.tr.html
===================================================================
RCS file:
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.tr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/remote-education-children-freedom-privacy-at-stake.tr.html
6 Oct 2020 08:42:01 -0000 1.5
+++ education/remote-education-children-freedom-privacy-at-stake.tr.html
10 Nov 2020 17:37:30 -0000 1.6
@@ -259,11 +259,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
FotoÄraflar Javier Sepúlveda'nın izniyle kullanılmıÅtır. <a
rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.tr"> Creative
Commons Alıntı-Türetilemez 4.0 Uluslararası Lisansı</a> altında
lisanslanmıÅtır.</p>
+</blockquote>
</div>
<div class="translators-notes">
@@ -347,7 +349,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/remote-education-children-freedom-privacy-at-stake.zh-cn.html
===================================================================
RCS file:
/web/www/www/education/remote-education-children-freedom-privacy-at-stake.zh-cn.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/remote-education-children-freedom-privacy-at-stake.zh-cn.html
6 Oct 2020 08:42:01 -0000 1.3
+++ education/remote-education-children-freedom-privacy-at-stake.zh-cn.html
10 Nov 2020 17:37:30 -0000 1.4
@@ -176,10 +176,12 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
ç
§çè´æ Javier Sepúlvedaãå®ä»¬ä½¿ç¨ <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
Attribution-NoDerivatives 4.0 International License</a> ææã</p>
+</blockquote>
</div>
<div class="translators-notes">
@@ -250,7 +252,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/10/06 08:42:01 $
+$Date: 2020/11/10 17:37:30 $
<!-- timestamp end -->
</p>
Index: education/po/edu-cases-argentina-ecen.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.de-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-argentina-ecen.de-en.html 31 May 2020 05:35:14
-0000 1.33
+++ education/po/edu-cases-argentina-ecen.de-en.html 10 Nov 2020 17:37:31
-0000 1.34
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- education/po/edu-cases-argentina-ecen.de.po 31 May 2020 05:01:39 -0000
1.40
+++ education/po/edu-cases-argentina-ecen.de.po 10 Nov 2020 17:37:31 -0000
1.41
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: edu-cases-argentinia-ecen.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-09-13 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
"<span xml:lang=\"es\" lang=\"es\">Escuela Cristiana Evangélica de Neuquén "
"(ECEN)</span>"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -377,7 +377,7 @@
"verbreiten wir was wir gelernt haben, um anderen Bildungseinrichtungen zu "
"helfen."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.el-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.el-en.html 31 May 2020 05:35:14
-0000 1.4
+++ education/po/edu-cases-argentina-ecen.el-en.html 10 Nov 2020 17:37:31
-0000 1.5
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.el.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.el.po 31 May 2020 05:01:13 -0000
1.7
+++ education/po/edu-cases-argentina-ecen.el.po 10 Nov 2020 17:37:31 -0000
1.8
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2015-04-28 10:15+0200\n"
"Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
"Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "ΧÏιÏÏÎ¹Î±Î½Î¹ÎºÏ ÎÏ
Î±Î³Î³ÎµÎ»Î¹ÎºÏ Î£Ïολείο ÏοÏ
Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -390,7 +390,7 @@
"διαδίδοÏ
με αÏ
Ïά ÏοÏ
μάθαμε, οÏÏÏÏ ÏÏÏε να
βοηθήÏοÏ
με Î¬Î»Î»ÎµÏ ÎµÎºÏαιδεÏ
ÏικÎÏ "
"κοινÏÏηÏεÏ."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.es-en.html 31 May 2020 05:35:14
-0000 1.6
+++ education/po/edu-cases-argentina-ecen.es-en.html 10 Nov 2020 17:37:31
-0000 1.7
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-argentina-ecen.es.po 31 May 2020 05:00:59 -0000
1.15
+++ education/po/edu-cases-argentina-ecen.es.po 10 Nov 2020 17:37:31 -0000
1.16
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-09-14 11:23+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -67,7 +67,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -380,7 +380,7 @@
"agradable. Ahora difundimos lo que hemos aprendido con el fin de ayudar a "
"otras comunidades educativas."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.fr-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- education/po/edu-cases-argentina-ecen.fr-en.html 31 May 2020 05:35:14
-0000 1.29
+++ education/po/edu-cases-argentina-ecen.fr-en.html 10 Nov 2020 17:37:31
-0000 1.30
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/po/edu-cases-argentina-ecen.fr.po 5 Oct 2020 13:13:20 -0000
1.32
+++ education/po/edu-cases-argentina-ecen.fr.po 10 Nov 2020 17:37:31 -0000
1.33
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-11-03 12:59+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -63,7 +63,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -376,7 +376,7 @@
"Ã conduire ce processus. Maintenant, nous diffusons ce que nous avons appris
"
"afin d'aider les autres communautés éducatives."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.hr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.hr-en.html 31 May 2020 05:35:14
-0000 1.6
+++ education/po/edu-cases-argentina-ecen.hr-en.html 10 Nov 2020 17:37:31
-0000 1.7
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.hr.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-argentina-ecen.hr.po 31 May 2020 05:02:15 -0000
1.16
+++ education/po/edu-cases-argentina-ecen.hr.po 10 Nov 2020 17:37:31 -0000
1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2014-04-10 20:34+0100\n"
"Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
"Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -366,7 +366,7 @@
"Premda je zahtijevao predanost i ustrajnost, proces je bio ugodan. Sada "
"Å¡irimo ono Å¡to smo nauÄili kako bismo pomogli drugim obrazovnim
zajednicama."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.it-en.html 31 May 2020 05:35:14
-0000 1.4
+++ education/po/edu-cases-argentina-ecen.it-en.html 10 Nov 2020 17:37:31
-0000 1.5
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.it.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.it.po 31 May 2020 05:02:41 -0000
1.7
+++ education/po/edu-cases-argentina-ecen.it.po 10 Nov 2020 17:37:31 -0000
1.8
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-10-01 09:46+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -64,7 +64,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Scuola Cristiana Evangelica di Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -376,7 +376,7 @@
"piacevole. Adesso diffondiamo quello che abbiamo imparato per aiutare altre "
"comunità educative."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ja-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-argentina-ecen.ja-en.html 31 May 2020 05:35:14
-0000 1.23
+++ education/po/edu-cases-argentina-ecen.ja-en.html 10 Nov 2020 17:37:31
-0000 1.24
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ja.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-cases-argentina-ecen.ja.po 31 Jul 2020 02:39:08 -0000
1.25
+++ education/po/edu-cases-argentina-ecen.ja.po 10 Nov 2020 17:37:31 -0000
1.26
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-31 11:19+0900\n"
"Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -345,7 +345,7 @@
"ç®èº«ã¨å¿èãå¿
è¦ã§ããããä½æ¥ã¯æ¥½ãããã®ã§ãããç¾å¨ãããããã®çµé¨ãåºå
±"
"ããä»ã®æè²ã°ã«ã¼ããæ¯æ´ãããã¨ãã¦ãã¾ãã"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.lt-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.lt-en.html 31 May 2020 05:35:14
-0000 1.4
+++ education/po/edu-cases-argentina-ecen.lt-en.html 10 Nov 2020 17:37:31
-0000 1.5
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.lt.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-argentina-ecen.lt.po 31 May 2020 05:03:06 -0000
1.5
+++ education/po/edu-cases-argentina-ecen.lt.po 10 Nov 2020 17:37:31 -0000
1.6
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-15 02:36+0200\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -363,7 +363,7 @@
"mes skleidžiame tai, kÄ
mes iÅ¡mokome, siekdami padÄti kitoms
Å¡vietÄjiÅ¡koms "
"bendruomenÄms."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- education/po/edu-cases-argentina-ecen.pot 31 May 2020 05:35:14 -0000
1.17
+++ education/po/edu-cases-argentina-ecen.pot 10 Nov 2020 17:37:31 -0000
1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -284,7 +284,7 @@
"communities."
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pt-br-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.pt-br-en.html 31 May 2020 05:35:14
-0000 1.2
+++ education/po/edu-cases-argentina-ecen.pt-br-en.html 10 Nov 2020 17:37:31
-0000 1.3
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.pt-br.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-argentina-ecen.pt-br.po 31 May 2020 05:03:35
-0000 1.11
+++ education/po/edu-cases-argentina-ecen.pt-br.po 10 Nov 2020 17:37:31
-0000 1.12
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-08-14 05:58-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -369,7 +369,7 @@
"Agora, nós disseminamos o que aprendemos para ajudar outras comunidades "
"educacionais."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-argentina-ecen.ru-en.html 31 May 2020 05:35:14
-0000 1.4
+++ education/po/edu-cases-argentina-ecen.ru-en.html 10 Nov 2020 17:37:31
-0000 1.5
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.ru.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-argentina-ecen.ru.po 31 May 2020 05:03:48 -0000
1.7
+++ education/po/edu-cases-argentina-ecen.ru.po 10 Nov 2020 17:37:31 -0000
1.8
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-02-16 17:51+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -65,7 +65,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Ð¥ÑиÑÑианÑÐºÐ°Ñ ÐµÐ²Ð°Ð½Ð³ÐµÐ»Ð¸ÑÑÑÐºÐ°Ñ Ñкола
ÐеÑкена (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -365,7 +365,7 @@
"ÑамооÑвеÑженноÑÑи и ÑпоÑÑÑва, пÑоÑеÑÑ Ð±Ñл
пÑиÑÑнÑм. ТепеÑÑ Ð¼Ñ Ð´ÐµÐ»Ð¸Ð¼ÑÑ "
"пÑиобÑеÑеннÑм опÑÑом, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð¼Ð¾ÑÑ Ð´ÑÑгим
обÑазоваÑелÑнÑм ÑообÑеÑÑвам."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.tr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.tr-en.html 31 May 2020 05:35:14
-0000 1.2
+++ education/po/edu-cases-argentina-ecen.tr-en.html 10 Nov 2020 17:37:31
-0000 1.3
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.tr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.tr.po 31 May 2020 07:06:53 -0000
1.6
+++ education/po/edu-cases-argentina-ecen.tr.po 10 Nov 2020 17:37:31 -0000
1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-31 08:49+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -354,7 +354,7 @@
"Ãzveri ve azim gerektirse de süreç keyifliydi. Åimdi diÄer eÄitim "
"topluluklarına yardımcı olmak için öÄrendiklerimizi yayıyoruz."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.uk-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-argentina-ecen.uk-en.html 31 May 2020 05:35:14
-0000 1.6
+++ education/po/edu-cases-argentina-ecen.uk-en.html 10 Nov 2020 17:37:31
-0000 1.7
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.uk.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-argentina-ecen.uk.po 31 May 2020 05:35:14 -0000
1.13
+++ education/po/edu-cases-argentina-ecen.uk.po 10 Nov 2020 17:37:31 -0000
1.14
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2014-04-03 18:03+0300\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <www-uk-translations@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Ð¥ÑиÑÑиÑнÑÑка ÑвангелÑÑÑка Ñкола
ÐеÑкена (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -362,7 +362,7 @@
"добÑе. Ð¢ÐµÐ¿ÐµÑ Ð¼Ð¸ ÑозповÑдаÑмо Ñе, Ñо
дÑзналиÑÑ, аби допомогÑи ÑнÑим "
"навÑалÑним закладам."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-argentina-ecen.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.zh-cn-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.zh-cn-en.html 31 May 2020 05:35:14
-0000 1.2
+++ education/po/edu-cases-argentina-ecen.zh-cn-en.html 10 Nov 2020 17:37:31
-0000 1.3
@@ -40,11 +40,13 @@
<div id="last-div" class="reduced-width">
<h2>Escuela Cristiana Evangélica de Neuquén (ECEN)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was extracted from a report submitted to us
by ECEN Elementary Teacher Debora Badilla Huento. Her commitment played
a key role in raising Free Software awareness and ultimately getting
the school to migrate.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -174,9 +176,11 @@
communities.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We would like to express our appreciation for the excellent work done to
all the people involved in the migration effort.</p>
+</blockquote>
</div>
<!--#include virtual="/education/education-menu.html" -->
<!--#include virtual="/server/footer.html" -->
@@ -218,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:14 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-argentina-ecen.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-argentina-ecen.zh-cn.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-argentina-ecen.zh-cn.po 31 May 2020 05:04:30
-0000 1.2
+++ education/po/edu-cases-argentina-ecen.zh-cn.po 10 Nov 2020 17:37:31
-0000 1.3
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-argentina-ecen.html\n"
-"POT-Creation-Date: 2020-05-27 11:13+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-12-02 09:39+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn.translators@gnu.org>\n"
@@ -61,7 +61,7 @@
msgid "Escuela Cristiana Evangélica de Neuquén (ECEN)"
msgstr "Escuela Cristiana Evangélica de Neuquén (ECEN)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was extracted from a report submitted to us by "
"ECEN Elementary Teacher Debora Badilla Huento. Her commitment played a key "
@@ -329,7 +329,7 @@
"è½ç¶å®éè¦å¥ç®ååé§ï¼æ´ä¸ªè¿ç¨è¿æ¯ä»¤äººææ¦çãç°å¨æ们ä¼
ææ们æå¦ï¼ä»¥å¸®å©å
¶"
"ä»æè²ç¤¾åºã"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We would like to express our appreciation for the excellent work done to all "
"the people involved in the migration effort."
Index: education/po/edu-cases-india-ambedkar.ar-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ar-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-ambedkar.ar-en.html 31 May 2020 05:35:15
-0000 1.3
+++ education/po/edu-cases-india-ambedkar.ar-en.html 10 Nov 2020 17:37:31
-0000 1.4
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.ar.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ar.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-ambedkar.ar.po 31 May 2020 05:00:58 -0000
1.7
+++ education/po/edu-cases-india-ambedkar.ar.po 10 Nov 2020 17:37:31 -0000
1.8
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-05-16 01:15+0300\n"
"Last-Translator: Mohammed Isam <mohammed_isam1984@yahoo.com>\n"
"Language-Team: Arabic <www-ar-translators@gnu.org>\n"
@@ -67,7 +67,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Ù
رÙز Ø£Ù
بÙدÙار اﻻجتÙ
اع٠ÙÙØÙسبة (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -236,7 +236,7 @@
"Ùؤﻻء اÙØ·Ùاب ÙÙÙÙÙ٠أ٠اÙÙ
Ùارات اÙت٠ÙتعÙÙ
ÙÙÙا Ù٠اÙÙ
رÙز ÙÙا باÙغ اﻷثر ÙÙ "
"Ù
ساعدتÙÙ
عÙÙ Ù
تابعة Ù
ÙرراتÙÙ
اÙÙ
درسÙØ©
ÙاÙÙØ¬Ø§Ø ÙÙÙا بصÙرة Ù
رضÙØ©."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.de-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/po/edu-cases-india-ambedkar.de-en.html 31 May 2020 05:35:15
-0000 1.41
+++ education/po/edu-cases-india-ambedkar.de-en.html 10 Nov 2020 17:37:31
-0000 1.42
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.de.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- education/po/edu-cases-india-ambedkar.de.po 31 May 2020 05:01:39 -0000
1.50
+++ education/po/edu-cases-india-ambedkar.de.po 10 Nov 2020 17:37:31 -0000
1.51
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-09-13 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -65,7 +65,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Ambedkar Community Computing Center (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -242,7 +242,7 @@
"unschätzbarer Hilfe sind, um den Kursen erfolgreich zu folgen und "
"abzuschlieÃen."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.el-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.el-en.html 31 May 2020 05:35:15
-0000 1.6
+++ education/po/edu-cases-india-ambedkar.el-en.html 10 Nov 2020 17:37:31
-0000 1.7
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.el.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-ambedkar.el.po 31 May 2020 05:01:13 -0000
1.11
+++ education/po/edu-cases-india-ambedkar.el.po 10 Nov 2020 17:37:31 -0000
1.12
@@ -11,7 +11,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2015-04-27 22:02+0200\n"
"Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
"Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "ÎÎνÏÏο ΠληÏοÏοÏÎ¹ÎºÎ®Ï ÏÎ·Ï ÎοινÏÏηÏαÏ
Ambedkar (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -246,7 +246,7 @@
"ÏÏο ÎÎνÏÏο είναι μια ανεκÏίμηÏη βοήθεια
γι αÏ
Ïά ÏÏοκειμÎνοÏ
να μÏοÏÎÏοÏ
ν να "
"ÏαÏακολοÏ
θήÏοÏ
ν και να ÏεÏάÏοÏ
ν με εÏιÏÏ
Ïία κι εκείνα Ïα μαθήμαÏα."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-india-ambedkar.es-en.html 31 May 2020 05:35:15
-0000 1.13
+++ education/po/edu-cases-india-ambedkar.es-en.html 10 Nov 2020 17:37:31
-0000 1.14
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.es.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/po/edu-cases-india-ambedkar.es.po 31 May 2020 05:00:59 -0000
1.21
+++ education/po/edu-cases-india-ambedkar.es.po 10 Nov 2020 17:37:31 -0000
1.22
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-30 10:23+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -67,7 +67,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Centro de Computación Comunitario de Ambedkar (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -242,7 +242,7 @@
"el Centro son de inestimable ayuda para seguir esos cursos y superarlos con "
"éxito."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.fr-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-india-ambedkar.fr-en.html 31 May 2020 05:35:15
-0000 1.33
+++ education/po/edu-cases-india-ambedkar.fr-en.html 10 Nov 2020 17:37:31
-0000 1.34
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:31 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.fr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-cases-india-ambedkar.fr.po 5 Oct 2020 13:13:20 -0000
1.33
+++ education/po/edu-cases-india-ambedkar.fr.po 10 Nov 2020 17:37:31 -0000
1.34
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-11-03 12:59+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -65,7 +65,7 @@
"Centre informatique communautaire Ambedkar (<abbr title=\"Ambedkar Community "
"Computing Center\">AC3</abbr>)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -241,7 +241,7 @@
"disent-ils, leur sont d'une aide inestimable pour suivre ces cours avec "
"succès."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.hr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-ambedkar.hr-en.html 31 May 2020 05:35:15
-0000 1.11
+++ education/po/edu-cases-india-ambedkar.hr-en.html 10 Nov 2020 17:37:32
-0000 1.12
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.hr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/po/edu-cases-india-ambedkar.hr.po 31 May 2020 05:02:15 -0000
1.18
+++ education/po/edu-cases-india-ambedkar.hr.po 10 Nov 2020 17:37:32 -0000
1.19
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2014-03-06 22:11+0100\n"
"Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
"Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "RaÄunalni centar zajednice Ambedkar (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -238,7 +238,7 @@
"teÄajeve u Å¡koli. Kažu da su im vjeÅ¡tine koje su stekli u centru od "
"neprocjenjive pomoÄi u pohaÄanju i uspjeÅ¡nom polaganju tih teÄajeva."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-ambedkar.it-en.html 31 May 2020 05:35:15
-0000 1.23
+++ education/po/edu-cases-india-ambedkar.it-en.html 10 Nov 2020 17:37:32
-0000 1.24
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.it.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/po/edu-cases-india-ambedkar.it.po 31 May 2020 05:02:41 -0000
1.30
+++ education/po/edu-cases-india-ambedkar.it.po 10 Nov 2020 17:37:32 -0000
1.31
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-02-02 19:27+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -64,7 +64,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Centro comunitario di informatica Ambedkar (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -239,7 +239,7 @@
"imparato al centro sono per loro di inestimabile aiuto per seguire e "
"superare questi corsi con successo. "
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ja-en.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- education/po/edu-cases-india-ambedkar.ja-en.html 31 May 2020 05:35:15
-0000 1.27
+++ education/po/edu-cases-india-ambedkar.ja-en.html 10 Nov 2020 17:37:32
-0000 1.28
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/po/edu-cases-india-ambedkar.ja.po 31 Jul 2020 02:39:08 -0000
1.35
+++ education/po/edu-cases-india-ambedkar.ja.po 10 Nov 2020 17:37:32 -0000
1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-31 11:22+0900\n"
"Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Ambedkar Community Computing Center (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -230,7 +230,7 @@
"ä¾ããã¾ããããããåä¾ãã¡ã¯ãã»ã³ã¿ã¼ã§ç¿ãã¹ãã«ãå¦æ
¡ã§ã®ææ¥ãããªãã®"
"ã«ã¨ã¦ãå½¹ç«ã£ã¦ããã®ã ã¨è¨ã£ã¦ãã¾ãã"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.lt-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-india-ambedkar.lt-en.html 31 May 2020 05:35:15
-0000 1.5
+++ education/po/edu-cases-india-ambedkar.lt-en.html 10 Nov 2020 17:37:32
-0000 1.6
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.lt.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/edu-cases-india-ambedkar.lt.po 31 May 2020 05:03:06 -0000
1.9
+++ education/po/edu-cases-india-ambedkar.lt.po 10 Nov 2020 17:37:32 -0000
1.10
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-15 02:31+0200\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Ambedkar bendruomenÄs kompiuterijos centras (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -239,7 +239,7 @@
"kursus mokykloje. Jie praneša, kad įgūdžiai, kuriuos jie išmoksta
Centre, "
"jiems yra neįkainojama pagalba sekti ir iÅ¡laikyti tuos kursus sÄkmingai."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pot,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- education/po/edu-cases-india-ambedkar.pot 31 May 2020 05:35:15 -0000
1.22
+++ education/po/edu-cases-india-ambedkar.pot 10 Nov 2020 17:37:32 -0000
1.23
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-31 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -184,7 +184,7 @@
"invaluable help for them to follow and pass those courses successfully."
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pt-br-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.pt-br-en.html 31 May 2020 05:35:15
-0000 1.6
+++ education/po/edu-cases-india-ambedkar.pt-br-en.html 10 Nov 2020 17:37:32
-0000 1.7
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.pt-br.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-ambedkar.pt-br.po 31 May 2020 05:03:35
-0000 1.12
+++ education/po/edu-cases-india-ambedkar.pt-br.po 10 Nov 2020 17:37:32
-0000 1.13
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-26 13:32-0200\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Centro de Computação Comunitária de Ambedkar (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -240,7 +240,7 @@
"Centro são de grande ajuda para acompanhar e passar naqueles cursos com "
"sucesso."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/edu-cases-india-ambedkar.ru-en.html 31 May 2020 05:35:15
-0000 1.9
+++ education/po/edu-cases-india-ambedkar.ru-en.html 10 Nov 2020 17:37:32
-0000 1.10
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:32 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-ambedkar.ru.po 31 May 2020 05:03:48 -0000
1.12
+++ education/po/edu-cases-india-ambedkar.ru.po 10 Nov 2020 17:37:32 -0000
1.13
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-26 17:34+0000\n"
"Last-Translator: Andrei Fediukov <redandrei@fedoraproject.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "ÐмбедкаÑÑкий обÑеÑÑвеннÑй
вÑÑиÑлиÑелÑнÑй ÑенÑÑ (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -239,7 +239,7 @@
"оказÑваÑÑ Ð¸Ð¼ неоÑенимÑÑ Ð¿Ð¾Ð¼Ð¾ÑÑ, когда они
пÑоÑ
одÑÑ ÑÑи кÑÑÑÑ, а заÑем "
"ÑÑпеÑно ÑдаÑÑ ÑкзаменÑ."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.tr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/edu-cases-india-ambedkar.tr-en.html 31 May 2020 05:35:15
-0000 1.2
+++ education/po/edu-cases-india-ambedkar.tr-en.html 10 Nov 2020 17:37:33
-0000 1.3
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:33 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.tr.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-ambedkar.tr.po 31 May 2020 07:06:53 -0000
1.7
+++ education/po/edu-cases-india-ambedkar.tr.po 10 Nov 2020 17:37:34 -0000
1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-31 08:49+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -64,7 +64,7 @@
"Ambedkar TopluluÄu BiliÅim Merkezi (<abbr title=\"Ambedkar Community "
"Computing Center\">AC3</abbr>)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -236,7 +236,7 @@
"alıyorlar. Merkez'de öÄrendikleri becerilerin, bu dersleri baÅarılı bir
"
"Åekilde takip etmeleri ve geçmeleri için çok deÄerli olduÄunu
söylüyorlar."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.uk-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-cases-india-ambedkar.uk-en.html 31 May 2020 05:35:15
-0000 1.8
+++ education/po/edu-cases-india-ambedkar.uk-en.html 10 Nov 2020 17:37:34
-0000 1.9
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:34 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.uk.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-india-ambedkar.uk.po 31 May 2020 05:04:16 -0000
1.16
+++ education/po/edu-cases-india-ambedkar.uk.po 10 Nov 2020 17:37:34 -0000
1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2014-04-03 18:03+0300\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <www-uk-translations@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "ÐмбедкаÑÑÑкий гÑомадÑÑкий
обÑиÑлÑвалÑний ÑенÑÑ (AC3)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -240,7 +240,7 @@
"кÑÑÑи в ÑколÑ. Ðони кажÑÑÑ, Ñо навиÑки,
набÑÑÑ Ð½Ð¸Ð¼Ð¸ в ÑенÑÑÑ, надали "
"неоÑÑÐ½ÐµÐ½Ð½Ñ Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ñ Ñ Ð²ÑдвÑдÑÐ²Ð°Ð½Ð½Ñ Ñа
ÑÑпÑÑного ÑÐºÐ»Ð°Ð´Ð°Ð½Ð½Ñ ÑиÑ
кÑÑÑÑв."
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-ambedkar.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.zh-cn-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-ambedkar.zh-cn-en.html 31 May 2020 05:35:15
-0000 1.6
+++ education/po/edu-cases-india-ambedkar.zh-cn-en.html 10 Nov 2020 17:37:34
-0000 1.7
@@ -40,9 +40,11 @@
<div id="last-div" class="reduced-width">
<h2>Ambedkar Community Computing Center (AC3)</h2>
-<p class="italic">
+<blockquote>
+<p>
The following information was submitted to us by the group of volunteers
working at the Center.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -121,12 +123,14 @@
successfully.</p>
</div>
-<p class="italic">
+<blockquote>
+<p>
We are informed that the outstanding effort of Free Software
volunteers is expanding in these deprived areas of the city, with
remarkable results. If you would like to contribute or donate laptops to
this group, please contact us at
<a href="mailto:education@gnu.org"><education@gnu.org></a>.</p>
+</blockquote>
<div class="infobox">
<p>The image on this page is licensed under the CC-BY-SA,
@@ -174,7 +178,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/05/31 05:35:15 $
+$Date: 2020/11/10 17:37:34 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-ambedkar.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-ambedkar.zh-cn.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-cases-india-ambedkar.zh-cn.po 31 May 2020 05:04:30
-0000 1.8
+++ education/po/edu-cases-india-ambedkar.zh-cn.po 10 Nov 2020 17:37:35
-0000 1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-ambedkar.html\n"
-"POT-Creation-Date: 2020-05-27 10:41+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-30 20:47+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -60,7 +60,7 @@
msgid "Ambedkar Community Computing Center (AC3)"
msgstr "Ambedkar社åºè®¡ç®ä¸å¿ï¼AC3ï¼"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following information was submitted to us by the group of volunteers "
"working at the Center."
@@ -213,7 +213,7 @@
"å
¶ä¸ä¸äºå©åå¨å¦æ ¡ä¹åå
äºè®¡ç®è¯¾ç¨ãä»ä»¬æ±æ¥è¯´å¨ä¸å¿å¦å°çææ¯é常æä»·å¼ï¼å¸®"
"å©ä»ä»¬å¦ä¹ 并æåéè¿å¦æ ¡ç课ç¨ã"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"We are informed that the outstanding effort of Free Software volunteers is "
"expanding in these deprived areas of the city, with remarkable results. If "
Index: education/po/edu-cases-india-irimpanam.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.de-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- education/po/edu-cases-india-irimpanam.de-en.html 25 Jul 2020 20:00:28
-0000 1.48
+++ education/po/edu-cases-india-irimpanam.de-en.html 10 Nov 2020 17:37:36
-0000 1.49
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- education/po/edu-cases-india-irimpanam.de.po 25 Jul 2020 20:00:28
-0000 1.70
+++ education/po/edu-cases-india-irimpanam.de.po 10 Nov 2020 17:37:36
-0000 1.71
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-10-25 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Vocational Higher Secondary School Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.el-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.el-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.el-en.html 25 Jul 2020 20:00:28
-0000 1.7
+++ education/po/edu-cases-india-irimpanam.el-en.html 10 Nov 2020 17:37:36
-0000 1.8
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.el.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-irimpanam.el.po 25 Jul 2020 20:00:28
-0000 1.23
+++ education/po/edu-cases-india-irimpanam.el.po 10 Nov 2020 17:37:36
-0000 1.24
@@ -11,7 +11,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2015-04-28 21:45+0200\n"
"Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
"Language-Team: www-el <www-el-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "ÎνÏÏεÏο ÎεÏ
ÏεÏοβάθμιο ÎÏαγγελμαÏικÏ
ΣÏολείο ÏοÏ
Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.es-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-cases-india-irimpanam.es-en.html 21 Jun 2020 10:58:50
-0000 1.34
+++ education/po/edu-cases-india-irimpanam.es-en.html 10 Nov 2020 17:37:36
-0000 1.35
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/21 10:58:50 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.es.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-cases-india-irimpanam.es.po 21 Jun 2020 10:58:50
-0000 1.39
+++ education/po/edu-cases-india-irimpanam.es.po 10 Nov 2020 17:37:36
-0000 1.40
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-21 03:13-0500\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -68,7 +68,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Escuela Vocacional de Secundaria Superior Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.fr-en.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- education/po/edu-cases-india-irimpanam.fr-en.html 21 Jun 2020 07:29:06
-0000 1.50
+++ education/po/edu-cases-india-irimpanam.fr-en.html 10 Nov 2020 17:37:36
-0000 1.51
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/21 07:29:06 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- education/po/edu-cases-india-irimpanam.fr.po 5 Oct 2020 13:13:21
-0000 1.67
+++ education/po/edu-cases-india-irimpanam.fr.po 10 Nov 2020 17:37:36
-0000 1.68
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-21 09:01+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -64,7 +64,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Lycée professionnel d'Irimpanam (VHSS Irimpanam)"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.hr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-cases-india-irimpanam.hr-en.html 25 Jul 2020 20:00:28
-0000 1.13
+++ education/po/edu-cases-india-irimpanam.hr-en.html 10 Nov 2020 17:37:36
-0000 1.14
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.hr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- education/po/edu-cases-india-irimpanam.hr.po 25 Jul 2020 20:00:28
-0000 1.21
+++ education/po/edu-cases-india-irimpanam.hr.po 10 Nov 2020 17:37:36
-0000 1.22
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2013-04-23 22:10+0100\n"
"Last-Translator: Marin Rameša <marin.ramesa@gmail.com>\n"
"Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -64,7 +64,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Strukovna viša srednja škola Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.it-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-cases-india-irimpanam.it-en.html 25 Jul 2020 20:00:28
-0000 1.31
+++ education/po/edu-cases-india-irimpanam.it-en.html 10 Nov 2020 17:37:36
-0000 1.32
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.it.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- education/po/edu-cases-india-irimpanam.it.po 25 Jul 2020 20:00:28
-0000 1.49
+++ education/po/edu-cases-india-irimpanam.it.po 10 Nov 2020 17:37:36
-0000 1.50
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-02-02 19:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -63,7 +63,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Scuola professionale di Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ja-en.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- education/po/edu-cases-india-irimpanam.ja-en.html 30 Jun 2020 22:29:55
-0000 1.30
+++ education/po/edu-cases-india-irimpanam.ja-en.html 10 Nov 2020 17:37:36
-0000 1.31
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/30 22:29:55 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ja.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- education/po/edu-cases-india-irimpanam.ja.po 31 Jul 2020 02:39:08
-0000 1.44
+++ education/po/edu-cases-india-irimpanam.ja.po 10 Nov 2020 17:37:36
-0000 1.45
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-31 11:19+0900\n"
"Last-Translator: Katsuya TANAKA <katsuya@member.fsf.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -62,7 +62,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Vocational Higher Secondary School Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.ko-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ko-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-irimpanam.ko-en.html 25 Jul 2020 20:00:28
-0000 1.6
+++ education/po/edu-cases-india-irimpanam.ko-en.html 10 Nov 2020 17:37:36
-0000 1.7
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.ko.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ko.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-cases-india-irimpanam.ko.po 25 Jul 2020 20:00:28
-0000 1.25
+++ education/po/edu-cases-india-irimpanam.ko.po 10 Nov 2020 17:37:36
-0000 1.26
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2012-11-05 01:10+0900\n"
"Last-Translator: Jongmin Yoon <blueguy@gnu.org>\n"
"Language-Team: Korean <www-ko-translator@gnu.org>\n"
@@ -67,7 +67,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Vocational Higher Secondary School Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.lt-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-india-irimpanam.lt-en.html 25 Jul 2020 20:00:28
-0000 1.5
+++ education/po/edu-cases-india-irimpanam.lt-en.html 10 Nov 2020 17:37:36
-0000 1.6
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.lt.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- education/po/edu-cases-india-irimpanam.lt.po 25 Jul 2020 20:00:28
-0000 1.16
+++ education/po/edu-cases-india-irimpanam.lt.po 10 Nov 2020 17:37:36
-0000 1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2015-08-13 21:11+0300\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "ProfesinÄ aukÅ¡tesnioji pagrindinÄ mokykla Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.ml-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ml-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-irimpanam.ml-en.html 10 Jul 2020 13:59:54
-0000 1.3
+++ education/po/edu-cases-india-irimpanam.ml-en.html 10 Nov 2020 17:37:36
-0000 1.4
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/10 13:59:54 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.ml.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ml.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.ml.po 10 Jul 2020 13:59:54
-0000 1.15
+++ education/po/edu-cases-india-irimpanam.ml.po 10 Nov 2020 17:37:36
-0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-09 19:51+0530\n"
"Last-Translator: Anupa Ann Joseph <anupaannjoseph@gmail.com>\n"
"Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -62,7 +62,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "à´µàµà´àµà´àµà´·à´¨à´²àµâ ഹയരàµâ
à´¸àµà´àµà´à´£àµà´à´±à´¿ à´¸àµà´àµà´³àµâ à´à´°à´¿à´®àµà´ªà´¨à´"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.nl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.nl-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-cases-india-irimpanam.nl-en.html 22 Jun 2020 10:01:52
-0000 1.4
+++ education/po/edu-cases-india-irimpanam.nl-en.html 10 Nov 2020 17:37:36
-0000 1.5
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 10:01:52 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.nl.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.nl.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-irimpanam.nl.po 22 Jun 2020 10:01:52
-0000 1.12
+++ education/po/edu-cases-india-irimpanam.nl.po 10 Nov 2020 17:37:36
-0000 1.13
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-09-17 22:52+0200\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <Www-nl-translators@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Hogere middelbare school voor beroepsonderwijs Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.pl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pl-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-cases-india-irimpanam.pl-en.html 22 Jun 2020 12:02:44
-0000 1.6
+++ education/po/edu-cases-india-irimpanam.pl-en.html 10 Nov 2020 17:37:36
-0000 1.7
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 12:02:44 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.pl.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pl.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.pl.po 22 Jun 2020 12:02:44
-0000 1.15
+++ education/po/edu-cases-india-irimpanam.pl.po 10 Nov 2020 17:37:36
-0000 1.16
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-27 22:10-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Zawodowa SzkoÅa w Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.pot
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pot,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- education/po/edu-cases-india-irimpanam.pot 20 Jun 2020 19:29:23 -0000
1.24
+++ education/po/edu-cases-india-irimpanam.pot 10 Nov 2020 17:37:36 -0000
1.25
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -57,7 +57,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pt-br-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.pt-br-en.html 22 Jun 2020
13:01:14 -0000 1.7
+++ education/po/edu-cases-india-irimpanam.pt-br-en.html 10 Nov 2020
17:37:36 -0000 1.8
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/22 13:01:14 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.pt-br.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-cases-india-irimpanam.pt-br.po 22 Jun 2020 13:01:14
-0000 1.15
+++ education/po/edu-cases-india-irimpanam.pt-br.po 10 Nov 2020 17:37:36
-0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-22 00:31-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Escola de Ensino Profissionalizante de Irimpanam"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- education/po/edu-cases-india-irimpanam.ru-en.html 20 Jun 2020 19:58:49
-0000 1.11
+++ education/po/edu-cases-india-irimpanam.ru-en.html 10 Nov 2020 17:37:36
-0000 1.12
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/20 19:58:49 $
+$Date: 2020/11/10 17:37:36 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- education/po/edu-cases-india-irimpanam.ru.po 20 Jun 2020 19:58:49
-0000 1.23
+++ education/po/edu-cases-india-irimpanam.ru.po 10 Nov 2020 17:37:36
-0000 1.24
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-20 00:30+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -63,7 +63,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "ÐÑÑмпанамÑкое ÑÑаÑÑее ÑÑеднее
пÑоÑеÑÑионалÑное ÑÑилиÑе"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-cases-india-irimpanam.tr-en.html 21 Jun 2020 07:59:07
-0000 1.3
+++ education/po/edu-cases-india-irimpanam.tr-en.html 10 Nov 2020 17:37:37
-0000 1.4
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/21 07:59:07 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.tr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- education/po/edu-cases-india-irimpanam.tr.po 21 Jun 2020 07:40:59
-0000 1.12
+++ education/po/edu-cases-india-irimpanam.tr.po 10 Nov 2020 17:37:37
-0000 1.13
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-21 09:37+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -61,7 +61,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Irimpanam Mesleki Okulu"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.uk-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/po/edu-cases-india-irimpanam.uk-en.html 25 Jul 2020 20:00:28
-0000 1.10
+++ education/po/edu-cases-india-irimpanam.uk-en.html 10 Nov 2020 17:37:37
-0000 1.11
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/25 20:00:28 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.uk.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- education/po/edu-cases-india-irimpanam.uk.po 25 Jul 2020 20:00:28
-0000 1.20
+++ education/po/edu-cases-india-irimpanam.uk.po 10 Nov 2020 17:37:37
-0000 1.21
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-11-05 12:33+0100\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <andriykopanytsia@gmail.com>\n"
@@ -66,7 +66,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "ÐÑÑмпанамÑÑка ÑÑÑна виÑа ÑеÑеднÑ
Ñкола"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-cases-india-irimpanam.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.zh-cn-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-cases-india-irimpanam.zh-cn-en.html 21 Jun 2020
02:29:15 -0000 1.7
+++ education/po/edu-cases-india-irimpanam.zh-cn-en.html 10 Nov 2020
17:37:37 -0000 1.8
@@ -41,9 +41,11 @@
<div id="last-div" class="reduced-width">
<h2>Vocational Higher Secondary School Irimpanam</h2>
-<p class="italic">
+<blockquote>
+<p>
The following report is based on information provided to us by the
school's staff.</p>
+</blockquote>
<div class="article">
<h3>Location</h3>
@@ -266,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/21 02:29:15 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-cases-india-irimpanam.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.zh-cn.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-cases-india-irimpanam.zh-cn.po 21 Jun 2020 02:29:15
-0000 1.14
+++ education/po/edu-cases-india-irimpanam.zh-cn.po 10 Nov 2020 17:37:37
-0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-cases-india-irimpanam.html\n"
-"POT-Creation-Date: 2020-06-20 19:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-21 09:49+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -60,7 +60,7 @@
msgid "Vocational Higher Secondary School Irimpanam"
msgstr "Irimpanamé«çº§èä¸ä¸å¦"
-#. type: Content of: <div><p>
+#. type: Content of: <div><blockquote><p>
msgid ""
"The following report is based on information provided to us by the school's "
"staff."
Index: education/po/edu-schools.ar-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ar-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-schools.ar-en.html 6 Oct 2020 08:42:02 -0000 1.3
+++ education/po/edu-schools.ar-en.html 10 Nov 2020 17:37:37 -0000 1.4
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.ar.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ar.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-schools.ar.po 6 Oct 2020 08:42:02 -0000 1.34
+++ education/po/edu-schools.ar.po 10 Nov 2020 17:37:37 -0000 1.35
@@ -13,7 +13,7 @@
msgstr ""
"Project-Id-Version: edu-schools.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-01-26 16:23+0200\n"
"Last-Translator: Karam Assany <karam.assany.web@gmail.com>\n"
"Language-Team: Arabic\n"
@@ -73,7 +73,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "بÙÙÙ
<a href=\"http://www.stallman.org/\">رÙتشارد ستÙÙÙ
اÙ</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -83,7 +83,7 @@
"Øت٠اÙجاÙ
Ø¹Ø©Ø Ø£Ù ØªÙ
تÙÙ ÙاجبÙا أخÙاÙÙÙا
Ùتدرس <a href=\"/education/education.html"
"\">اÙبراÙ
ج اÙØرة ÙÙØ·.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.ca-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ca-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.ca-en.html 6 Oct 2020 08:42:02 -0000 1.13
+++ education/po/edu-schools.ca-en.html 10 Nov 2020 17:37:37 -0000 1.14
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.ca.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ca.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- education/po/edu-schools.ca.po 6 Oct 2020 08:42:02 -0000 1.35
+++ education/po/edu-schools.ca.po 10 Nov 2020 17:37:37 -0000 1.36
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: schools.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-04-23 17:57+0200\n"
"Last-Translator: Miquel Puigpelat <mpuigpe1@xtec.cat>\n"
"Language-Team: Catalan <mpuigpe1@xtec.cat>\n"
@@ -67,7 +67,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "per <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
"fins a la universitat) té el deure moral de <a href=\"/education/education."
"html\">ensenyar només programari lliure.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.de-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.de-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-schools.de-en.html 6 Oct 2020 08:42:02 -0000 1.33
+++ education/po/edu-schools.de-en.html 10 Nov 2020 17:37:37 -0000 1.34
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.de.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.de.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- education/po/edu-schools.de.po 6 Oct 2020 08:42:02 -0000 1.62
+++ education/po/edu-schools.de.po 10 Nov 2020 17:37:37 -0000 1.63
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: edu-schools.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-09-13 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -68,7 +68,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "von <a href=\"//www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
"Vorschule bis Universität) haben eine moralische Verpflichtung <a href=\"/"
"education/\">nur Freie Software zu lehren</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.el-diff.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.el-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- education/po/edu-schools.el-diff.html 6 Oct 2020 08:42:02 -0000
1.33
+++ education/po/edu-schools.el-diff.html 10 Nov 2020 17:37:37 -0000
1.34
@@ -66,15 +66,14 @@
<p>Educational activities (including schools)</strong></del></span>
<span class="inserted"><ins><em>Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university,</em></ins></span> have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<span class="removed"><del><strong><p>All</strong></del></span>
-
-<span class="inserted"><ins><em><p class="italic">All</em></ins></span>
computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -84,7 +83,8 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
-<span class="inserted"><ins><em><div
class="column-limit"></div></em></ins></span>
+<span class="inserted"><ins><em></blockquote>
+<div class="column-limit"></div></em></ins></span>
<p>Free software can save schools money, but this is a secondary
benefit. Savings are possible because free software gives schools,
@@ -243,7 +243,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.el.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.el.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-schools.el.po 6 Oct 2020 08:42:02 -0000 1.31
+++ education/po/edu-schools.el.po 10 Nov 2020 17:37:37 -0000 1.32
@@ -12,7 +12,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2015-05-04 11:11+0200\n"
"Last-Translator: Georgios Zarkadas <gz@member.fsf.org>\n"
"Language-Team: Greek <www-el-translators@gnu.org>\n"
@@ -72,7 +72,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "αÏÏ Ïον <a href=\"http://www.stallman.org/\">Richard
Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Educational [-activities (including schools)-] {+activities, including
# | schools of all levels from kindergarten to university,+} have a moral duty
# | to <a href=\"/education/education.html\">teach only free software.</a>
@@ -89,7 +89,7 @@
"καθήκον <a href=\"/education/education.html\">να διδάÏκοÏ
ν
μÏνο ελεÏθεÏο "
"λογιÏμικÏ.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.es-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- education/po/edu-schools.es-en.html 6 Oct 2020 08:42:02 -0000 1.34
+++ education/po/edu-schools.es-en.html 10 Nov 2020 17:37:37 -0000 1.35
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.es.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- education/po/edu-schools.es.po 6 Oct 2020 08:42:02 -0000 1.46
+++ education/po/edu-schools.es.po 10 Nov 2020 17:37:37 -0000 1.47
@@ -12,7 +12,7 @@
msgstr ""
"Project-Id-Version: edu-schools.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-01-04 10:58+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -71,7 +71,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "por <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -82,7 +82,7 @@
"education/education.html\">el deber moral de enseñar únicamente software "
"libre</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.fr-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- education/po/edu-schools.fr-en.html 6 Oct 2020 08:42:02 -0000 1.41
+++ education/po/edu-schools.fr-en.html 10 Nov 2020 17:37:37 -0000 1.42
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.fr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- education/po/edu-schools.fr.po 6 Oct 2020 08:42:02 -0000 1.65
+++ education/po/edu-schools.fr.po 10 Nov 2020 17:37:37 -0000 1.66
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-28 10:01+0200\n"
"Last-Translator: Sogal <sogal AT member.fsf.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -68,7 +68,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "par <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
"d'enfants jusqu'à l'université, ont pour <a
href=\"/education/education.html"
"\">devoir moral de n'enseigner que le logiciel libre</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.hr-diff.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.hr-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.hr-diff.html 6 Oct 2020 08:42:02 -0000
1.13
+++ education/po/edu-schools.hr-diff.html 10 Nov 2020 17:37:37 -0000
1.14
@@ -66,15 +66,14 @@
<p>Educational activities (including schools)</strong></del></span>
<span class="inserted"><ins><em>Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university,</em></ins></span> have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<span class="removed"><del><strong><p>All</strong></del></span>
-
-<span class="inserted"><ins><em><p class="italic">All</em></ins></span>
computer users ought to
+<p>All computer users ought to
<span class="inserted"><ins><em><a
href="/philosophy/free-software-even-more-important.html"></em></ins></span>
insist on free <span
class="removed"><del><strong>software:</strong></del></span> <span
class="inserted"><ins><em>software</a>:</em></ins></span> it gives users
the freedom to control their own computers—with proprietary
@@ -84,7 +83,8 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
-<span class="inserted"><ins><em><div
class="column-limit"></div></em></ins></span>
+<span class="inserted"><ins><em></blockquote>
+<div class="column-limit"></div></em></ins></span>
<p>Free software can save schools money, but this is a secondary
benefit. Savings are possible because free software gives schools,
@@ -243,7 +243,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.hr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.hr.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- education/po/edu-schools.hr.po 6 Oct 2020 08:42:02 -0000 1.26
+++ education/po/edu-schools.hr.po 10 Nov 2020 17:37:37 -0000 1.27
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2014-04-10 21:59+0100\n"
"Last-Translator: Martina Bebek <martinaporec@pulsir.eu>\n"
"Language-Team: www-hr <www-hr-lista@gnu.org>\n"
@@ -70,7 +70,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "Autor: <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Educational [-activities (including schools)-] {+activities, including
# | schools of all levels from kindergarten to university,+} have a moral duty
# | to <a href=\"/education/education.html\">teach only free software.</a>
@@ -86,7 +86,7 @@
"Obrazovna djelatnost (ukljuÄujuÄi i Å¡kole) ima <a href=\"/education/"
"education.html\">dužnost pouÄavati samo slobodni softver.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.it-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- education/po/edu-schools.it-en.html 6 Oct 2020 08:42:02 -0000 1.22
+++ education/po/edu-schools.it-en.html 10 Nov 2020 17:37:37 -0000 1.23
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.it.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.it.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- education/po/edu-schools.it.po 6 Oct 2020 08:42:02 -0000 1.47
+++ education/po/edu-schools.it.po 10 Nov 2020 17:37:37 -0000 1.48
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-02 10:42+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -67,7 +67,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "di <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
"hanno il dovere morale di <a href=\"/education/education.html\">insegnare "
"solo il software libero</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ja-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- education/po/edu-schools.ja-en.html 6 Oct 2020 08:42:02 -0000 1.25
+++ education/po/edu-schools.ja-en.html 10 Nov 2020 17:37:37 -0000 1.26
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.ja.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- education/po/edu-schools.ja.po 6 Oct 2020 08:42:02 -0000 1.42
+++ education/po/edu-schools.ja.po 10 Nov 2020 17:37:37 -0000 1.43
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-01-16 16:18+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -65,7 +65,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a
href=\"http://www.stallman.org/\">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -75,7 +75,7 @@
"education/education.html\">èªç±ãªã½ããã¦ã§ã¢ã
ããæãã</a>éå¾³ç義åããã"
"ã¾ãã"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.lt-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.lt-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-schools.lt-en.html 6 Oct 2020 08:42:02 -0000 1.7
+++ education/po/edu-schools.lt-en.html 10 Nov 2020 17:37:37 -0000 1.8
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.lt.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.lt.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-schools.lt.po 6 Oct 2020 08:42:02 -0000 1.14
+++ education/po/edu-schools.lt.po 10 Nov 2020 17:37:37 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-14 21:03+0200\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -64,7 +64,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "Pagal <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -74,7 +74,7 @@
"universiteto, mokyklas, turi moralinÄ pareigÄ
<a
href=\"/education/education."
"html\">mokyti tik laisvÄ
programinÄ Ä¯rangÄ
.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.ml-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ml-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-schools.ml-en.html 6 Oct 2020 08:42:02 -0000 1.5
+++ education/po/edu-schools.ml-en.html 10 Nov 2020 17:37:37 -0000 1.6
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.ml.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ml.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-schools.ml.po 6 Oct 2020 08:42:02 -0000 1.39
+++ education/po/edu-schools.ml.po 10 Nov 2020 17:37:37 -0000 1.40
@@ -12,7 +12,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-04-19 17:44+0200\n"
"Last-Translator: Aiswarya kk <aiswaryakk29@gmail.com>\n"
"Language-Team: Malayalam <kde-i18n-doc@kde.org>\n"
@@ -71,7 +71,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "à´à´´àµà´¤à´¿à´¯à´¤àµàµ <a
href=\"http://www.stallman.org/\">റിà´àµà´à´¾à´°àµâà´¡àµ
à´¸àµà´±àµà´±à´¾à´³àµâമാനàµâ</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
"വിദàµà´¯à´¾à´àµà´¯à´¾à´¸à´ªà´°à´®à´¾à´¯
à´ªàµà´°à´µà´°àµâà´¤àµà´¤à´¨à´àµà´à´³àµâà´àµà´à´¾à´¯à´¿ <a
href=\"/education/education.html"
"\">à´¸àµà´µà´¤à´¨àµà´¤àµà´°à´¸àµà´«àµà´±àµà´±àµâà´µàµà´¯à´°àµâ
മാതàµà´°à´ പഠിപàµà´ªà´¿à´àµà´à´¾à´¨àµà´³àµà´³</a>
ധാരàµâà´®àµà´®à´¿à´à´®à´¾à´¯ à´à´°àµâà´¤àµà´¤à´µàµà´¯à´
à´à´£àµà´àµ."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.nl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.nl-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- education/po/edu-schools.nl-en.html 6 Oct 2020 08:42:02 -0000 1.10
+++ education/po/edu-schools.nl-en.html 10 Nov 2020 17:37:37 -0000 1.11
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.nl.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.nl.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- education/po/edu-schools.nl.po 6 Oct 2020 08:42:02 -0000 1.28
+++ education/po/edu-schools.nl.po 10 Nov 2020 17:37:37 -0000 1.29
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-04-03 20:34+0100\n"
"Last-Translator: Tom Uijldert <Tom.Uijldert@gmail.com>\n"
"Language-Team: \n"
@@ -68,7 +68,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "door <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -78,7 +78,7 @@
"\"/education/education.html\">morele verplichting alleen vrije software te "
"onderwijzen</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.pl-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pl-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- education/po/edu-schools.pl-en.html 6 Oct 2020 08:42:02 -0000 1.18
+++ education/po/edu-schools.pl-en.html 10 Nov 2020 17:37:37 -0000 1.19
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.pl.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- education/po/edu-schools.pl.po 6 Oct 2020 08:42:02 -0000 1.37
+++ education/po/edu-schools.pl.po 10 Nov 2020 17:37:37 -0000 1.38
@@ -11,7 +11,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-29 20:29-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -71,7 +71,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
"aby <a href=\"/education/education.html\">nauczaÄ wyÅÄ
cznie na "
"wolnym oprogramowaniu.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.pot
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- education/po/edu-schools.pot 6 Oct 2020 08:42:02 -0000 1.27
+++ education/po/edu-schools.pot 10 Nov 2020 17:37:37 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -60,14 +60,14 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr ""
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
"only free software.</a>"
msgstr ""
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a "
"href=\"/philosophy/free-software-even-more-important.html\"> insist on free "
Index: education/po/edu-schools.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pt-br-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-schools.pt-br-en.html 6 Oct 2020 08:42:02 -0000
1.15
+++ education/po/edu-schools.pt-br-en.html 10 Nov 2020 17:37:37 -0000
1.16
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.pt-br.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.pt-br.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- education/po/edu-schools.pt-br.po 6 Oct 2020 08:42:02 -0000 1.46
+++ education/po/edu-schools.pt-br.po 10 Nov 2020 17:37:37 -0000 1.47
@@ -11,7 +11,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.pt-br.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-01-01 10:50-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -70,7 +70,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "por <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -80,7 +80,7 @@
"escola até a universidade, têm o dever moral de <a href=\"/education/"
"education.html\">ensinar apenas software livre</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.ru-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ru-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- education/po/edu-schools.ru-en.html 6 Oct 2020 08:42:02 -0000 1.31
+++ education/po/edu-schools.ru-en.html 10 Nov 2020 17:37:37 -0000 1.32
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.ru.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- education/po/edu-schools.ru.po 6 Oct 2020 08:42:02 -0000 1.55
+++ education/po/edu-schools.ru.po 10 Nov 2020 17:37:37 -0000 1.56
@@ -12,7 +12,7 @@
msgid ""
msgstr ""
"Project-Id-Version: schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-04-22 17:17+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -71,7 +71,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">РиÑаÑд СÑолмен</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -81,7 +81,7 @@
"деÑÑкиÑ
Ñадов до вÑзов, обÑÐ·Ð°Ð½Ñ <a
href=\"/education/education.html"
"\">пÑеподаваÑÑ ÑолÑко ÑвободнÑе
пÑогÑаммÑ</a>."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.sq-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.sq-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-schools.sq-en.html 6 Oct 2020 08:42:02 -0000 1.13
+++ education/po/edu-schools.sq-en.html 10 Nov 2020 17:37:37 -0000 1.14
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.sq.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.sq.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- education/po/edu-schools.sq.po 6 Oct 2020 08:42:02 -0000 1.32
+++ education/po/edu-schools.sq.po 10 Nov 2020 17:37:37 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: \n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-01-03 17:54+0200\n"
"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
"Language-Team: sq\n"
@@ -66,7 +66,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "nga <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -76,7 +76,7 @@
"deri në universitete, kanë një detyrim moral <a
href=\"/education/education."
"html\">të japin mësim vetëm software të lirë.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.tr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-schools.tr-en.html 6 Oct 2020 08:42:02 -0000 1.4
+++ education/po/edu-schools.tr-en.html 10 Nov 2020 17:37:37 -0000 1.5
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.tr.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- education/po/edu-schools.tr.po 6 Oct 2020 08:42:02 -0000 1.15
+++ education/po/edu-schools.tr.po 10 Nov 2020 17:37:37 -0000 1.16
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-31 08:58+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -66,7 +66,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "yazan <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -76,7 +76,7 @@
"faaliyetleri, <a href=\"/education/education.html\">sadece özgür
yazılımı "
"öÄretmek gibi ahlaki bir göreve sahiptir.</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.uk-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- education/po/edu-schools.uk-en.html 6 Oct 2020 08:42:02 -0000 1.14
+++ education/po/edu-schools.uk-en.html 10 Nov 2020 17:37:37 -0000 1.15
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.uk.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.uk.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- education/po/edu-schools.uk.po 6 Oct 2020 08:42:02 -0000 1.38
+++ education/po/edu-schools.uk.po 10 Nov 2020 17:37:37 -0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-01-01 09:20+0200\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <>\n"
@@ -67,7 +67,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">Ð ÑÑаÑд СÑолмен</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -77,7 +77,7 @@
"до ÑнÑвеÑÑиÑеÑÑ Ð¼Ð¾ÑалÑно <a
href=\"/education/education.html\">зобов'ÑÐ·Ð°Ð½Ñ "
"викладаÑи ÑÑлÑки вÑлÑÐ½Ñ Ð¿ÑогÑами.</a> "
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-schools.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-schools.zh-cn-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-schools.zh-cn-en.html 6 Oct 2020 08:42:02 -0000
1.4
+++ education/po/edu-schools.zh-cn-en.html 10 Nov 2020 17:37:37 -0000
1.5
@@ -36,13 +36,14 @@
by <a href="http://www.stallman.org/">Richard Stallman</a></address>
<hr class="thin" />
<div class="article">
-<p class="italic">
+<blockquote>
+<p>
Educational activities, including schools of all levels from
kindergarten to university, have a moral duty
to <a href="/education/education.html">teach only free
software.</a></p>
-<p class="italic">All computer users ought to
+<p>All computer users ought to
<a href="/philosophy/free-software-even-more-important.html">
insist on free software</a>: it gives users
the freedom to control their own computers—with proprietary
@@ -52,6 +53,7 @@
reasons apply to schools as they do to everyone. However, the purpose
of this article is to present the additional reasons that apply
specifically to education.</p>
+</blockquote>
<div class="column-limit"></div>
<p>Free software can save schools money, but this is a secondary
@@ -204,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:02 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-schools.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-schools.zh-cn.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/edu-schools.zh-cn.po 6 Oct 2020 08:42:02 -0000 1.7
+++ education/po/edu-schools.zh-cn.po 10 Nov 2020 17:37:37 -0000 1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: edu-schools.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-01-01 15:54+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -62,7 +62,7 @@
msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">Richard Stallman</a> è"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Educational activities, including schools of all levels from kindergarten to "
"university, have a moral duty to <a href=\"/education/education.html\">teach "
@@ -71,7 +71,7 @@
"æè²æ´»å¨ï¼å
æ¬ä»å¹¼å¿åå°å¤§å¦çå级å¦æ ¡ï¼æéå¾·èè´£<a
href=\"/education/"
"education.html\">åªææèªç±è½¯ä»¶ã</a>"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All computer users ought to <a href=\"/philosophy/free-software-even-more-"
"important.html\"> insist on free software</a>: it gives users the freedom to "
Index: education/po/edu-software-gimp.es-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- education/po/edu-software-gimp.es-en.html 1 Aug 2020 09:29:15 -0000
1.1
+++ education/po/edu-software-gimp.es-en.html 10 Nov 2020 17:37:37 -0000
1.2
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/08/01 09:29:15 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.fr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/po/edu-software-gimp.fr-en.html 29 Jun 2020 11:32:41 -0000
1.39
+++ education/po/edu-software-gimp.fr-en.html 10 Nov 2020 17:37:37 -0000
1.40
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.hr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.hr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- education/po/edu-software-gimp.hr-en.html 29 Jun 2020 11:32:41 -0000
1.13
+++ education/po/edu-software-gimp.hr-en.html 10 Nov 2020 17:37:37 -0000
1.14
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.it-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- education/po/edu-software-gimp.it-en.html 29 Jun 2020 11:32:41 -0000
1.8
+++ education/po/edu-software-gimp.it-en.html 10 Nov 2020 17:37:37 -0000
1.9
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.ja-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.ja-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/edu-software-gimp.ja-en.html 29 Jun 2020 11:32:41 -0000
1.6
+++ education/po/edu-software-gimp.ja-en.html 10 Nov 2020 17:37:37 -0000
1.7
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.pt-br-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.pt-br-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-software-gimp.pt-br-en.html 29 Jun 2020 11:32:41
-0000 1.5
+++ education/po/edu-software-gimp.pt-br-en.html 10 Nov 2020 17:37:37
-0000 1.6
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.tr-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/edu-software-gimp.tr-en.html 29 Jun 2020 11:32:41 -0000
1.3
+++ education/po/edu-software-gimp.tr-en.html 10 Nov 2020 17:37:37 -0000
1.4
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.uk-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.uk-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/edu-software-gimp.uk-en.html 29 Jun 2020 11:32:41 -0000
1.4
+++ education/po/edu-software-gimp.uk-en.html 10 Nov 2020 17:37:37 -0000
1.5
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/edu-software-gimp.zh-cn-en.html
===================================================================
RCS file: /web/www/www/education/po/edu-software-gimp.zh-cn-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-software-gimp.zh-cn-en.html 29 Jun 2020 11:32:41
-0000 1.5
+++ education/po/edu-software-gimp.zh-cn-en.html 10 Nov 2020 17:37:37
-0000 1.6
@@ -75,7 +75,7 @@
<a
href="https://web.archive.org/web/20080516101605/http://www.saij-copyleft2.net/fragments1.html">her
work</a>:</p>
-<blockquote class="italic">
+<blockquote>
<p>“It's a program I use for different works: photo manipulation
(mixing images together), drawings (my ‘digital fragments’ in
relation
to my ‘real fragments’ made on paper), teaching to teenagers,
preparing
@@ -134,7 +134,7 @@
<p>At the time of writing (March 2012) Mani is a student of Computer
Science in Bangalore. He says:</p>
-<blockquote class="italic">
+<blockquote>
<p> “First I need to say thanks to the Free Software movement, it
allowed me to start learning GIMP. It was my first achievement in life,
and I sold many paintings at a Free Software conference. Later I started
@@ -150,7 +150,7 @@
<p>Richard Stallman's comment on this case:</p>
-<blockquote class="italic">
+<blockquote>
<p>“I am more proud that GNU has been adopted by Indian Dalits than
of its use by famous corporations.”</p>
</blockquote>
@@ -200,7 +200,7 @@
<p>Isabel Saij explains why she decided to break free from the trap by
adopting Free Software:</p>
-<blockquote class="italic">
+<blockquote>
<p> “With proprietary programs the artist is at the mercy of the
software development company. Early in 2003 I used LiveMotion to design
my digital 2D and 3D works with interactive pieces. Later that year the
@@ -295,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/29 11:32:41 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index:
education/po/remote-education-children-freedom-privacy-at-stake.es-en.html
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.es-en.html
6 Oct 2020 08:42:03 -0000 1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.es-en.html
10 Nov 2020 17:37:37 -0000 1.4
@@ -274,11 +274,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Photos courtesy of Javier Sepúlveda. Licensed under
<a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/">
Creative Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+</blockquote>
</div>
</div>
@@ -339,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/remote-education-children-freedom-privacy-at-stake.es.po
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/remote-education-children-freedom-privacy-at-stake.es.po
6 Oct 2020 08:42:03 -0000 1.7
+++ education/po/remote-education-children-freedom-privacy-at-stake.es.po
10 Nov 2020 17:37:37 -0000 1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-25 04:18-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -538,7 +538,7 @@
"\"/people/speakers.html#Sepulveda\">conferenciante de GNU</a> y promotor del "
"software libre."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
"\"http://creativecommons.org/licenses/by-nd/4.0/\"> Creative Commons "
Index:
education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html
6 Oct 2020 08:42:03 -0000 1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.fr-en.html
10 Nov 2020 17:37:37 -0000 1.4
@@ -274,11 +274,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Photos courtesy of Javier Sepúlveda. Licensed under
<a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/">
Creative Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+</blockquote>
</div>
</div>
@@ -339,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/remote-education-children-freedom-privacy-at-stake.fr.po
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- education/po/remote-education-children-freedom-privacy-at-stake.fr.po
6 Oct 2020 08:42:03 -0000 1.9
+++ education/po/remote-education-children-freedom-privacy-at-stake.fr.po
10 Nov 2020 17:37:37 -0000 1.10
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-07-25 16:10+0200\n"
"Last-Translator: Thérède Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -548,7 +548,7 @@
"est aussi <a href=\"/people/speakers.html#Sepulveda\">conférencier GNU</a> "
"et défenseur du logiciel libre."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
"\"http://creativecommons.org/licenses/by-nd/4.0/\"> Creative Commons "
Index: education/po/remote-education-children-freedom-privacy-at-stake.pot
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.pot,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/po/remote-education-children-freedom-privacy-at-stake.pot 6 Oct
2020 08:42:03 -0000 1.4
+++ education/po/remote-education-children-freedom-privacy-at-stake.pot 10 Nov
2020 17:37:37 -0000 1.5
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -377,7 +377,7 @@
"advocate."
msgstr ""
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" "
"href=\"http://creativecommons.org/licenses/by-nd/4.0/\"> Creative Commons "
Index:
education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html
6 Oct 2020 08:42:03 -0000 1.3
+++ education/po/remote-education-children-freedom-privacy-at-stake.tr-en.html
10 Nov 2020 17:37:37 -0000 1.4
@@ -274,11 +274,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Photos courtesy of Javier Sepúlveda. Licensed under
<a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/">
Creative Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+</blockquote>
</div>
</div>
@@ -339,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/remote-education-children-freedom-privacy-at-stake.tr.po
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.tr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- education/po/remote-education-children-freedom-privacy-at-stake.tr.po
6 Oct 2020 08:42:03 -0000 1.6
+++ education/po/remote-education-children-freedom-privacy-at-stake.tr.po
10 Nov 2020 17:37:37 -0000 1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-08-22 08:27+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -528,7 +528,7 @@
"kurucusu ve yöneticisi. O bir <a href=\"/people/speakers.html#Sepulveda"
"\">GNU konuÅmacısı</a> ve özgür yazılım savunucusudur."
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
"\"http://creativecommons.org/licenses/by-nd/4.0/\"> Creative Commons "
Index:
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
---
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html
6 Oct 2020 08:42:03 -0000 1.2
+++
education/po/remote-education-children-freedom-privacy-at-stake.zh-cn-en.html
10 Nov 2020 17:37:37 -0000 1.3
@@ -274,11 +274,13 @@
<div class="infobox">
<hr />
-<p class="italic">
+<blockquote>
+<p>
Photos courtesy of Javier Sepúlveda. Licensed under
<a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/">
Creative Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+</blockquote>
</div>
</div>
@@ -339,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:03 $
+$Date: 2020/11/10 17:37:37 $
<!-- timestamp end -->
</p>
</div>
Index: education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po
===================================================================
RCS file:
/web/www/www/education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po
6 Oct 2020 08:42:03 -0000 1.7
+++ education/po/remote-education-children-freedom-privacy-at-stake.zh-cn.po
10 Nov 2020 17:37:37 -0000 1.8
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: remote-education-children-freedom-privacy-at-stake.html\n"
-"POT-Creation-Date: 2020-10-06 08:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-08-01 18:51+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -469,7 +469,7 @@
"个æå¡å¨ç®¡çå
¬å¸ï¼å®åªè¿è¡åæä¾èªç±è½¯ä»¶ãä»è¿æ¯ä¸ä¸ª <a href=\"/people/"
"speakers.html#Sepulveda\">GNU æ¼è®²å®¶</a> åèªç±è½¯ä»¶å¡å¯¼è
ã"
-#. type: Content of: <div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Photos courtesy of Javier Sepúlveda. Licensed under <a rel=\"license\" href="
"\"http://creativecommons.org/licenses/by-nd/4.0/\"> Creative Commons "
Index: philosophy/saying-no-even-once.es.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/saying-no-even-once.es.html 6 Oct 2020 08:42:12 -0000
1.3
+++ philosophy/saying-no-even-once.es.html 10 Nov 2020 17:37:38 -0000
1.4
@@ -16,10 +16,12 @@
<address class="byline">por Richard Stallman</address>
<hr class="thin" />
-<p class="italic">Circula por ahà la falsa idea de que el Proyecto GNU exige
que se utilice
+<blockquote>
+<p>Circula por ahà la falsa idea de que el Proyecto GNU exige que se utilice
siempre <a href="/philosophy/free-sw.html">software libre</a> al 100%, y que
a todo el que utilice algo menos (¿un 90%?) lo mandaremos al diablo. Nada
más lejos de la realidad.</p>
+</blockquote>
<p>Nuestro objetivo primordial es la <a
href="/philosophy/free-software-even-more-important.html">libertad digital
@@ -158,7 +160,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/saying-no-even-once.fr.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/saying-no-even-once.fr.html 6 Oct 2020 08:42:12 -0000
1.4
+++ philosophy/saying-no-even-once.fr.html 10 Nov 2020 17:37:38 -0000
1.5
@@ -15,10 +15,12 @@
<address class="byline">par Richard Stallman</address>
<hr class="thin" />
-<p class="italic">Un malentendu circule selon lequel le projet GNU vous
demanderait d'utiliser
+<blockquote>
+<p>Un malentendu circule selon lequel le projet GNU vous demanderait d'utiliser
du logiciel 100% <a href="/philosophy/free-sw.html">libre</a>, tout le
temps. Que ce soit moins (90%?), et nous vous dirons d'aller vous faire
voir, disent-ils. Rien n'est plus éloigné de la vérité.</p>
+</blockquote>
<p>Notre but final est la <a
href="/philosophy/free-software-even-more-important.html">liberté numérique
@@ -165,7 +167,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/saying-no-even-once.tr.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.tr.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/saying-no-even-once.tr.html 6 Oct 2020 08:42:12 -0000
1.6
+++ philosophy/saying-no-even-once.tr.html 10 Nov 2020 17:37:38 -0000
1.7
@@ -15,10 +15,12 @@
<address class="byline">yazan Richard Stallman</address>
<hr class="thin" />
-<p class="italic">GNU Projesi'nin her zaman %100 <a
href="/philosophy/free-sw.html">özgür
+<blockquote>
+<p>GNU Projesi'nin her zaman %100 <a href="/philosophy/free-sw.html">özgür
yazılım</a> çalıÅtırmanızı talep ettiÄi Åeklinde bir yanlıŠanlama
var. Daha
az özgür herhangi bir Åey (%90?) söz konusu olduÄunda size defol
diyebileceÄimizi söylüyorlar. Gerçekten oldukça uzak bir söylem.</p>
+</blockquote>
<p>Nihai hedefimiz <a
href="/philosophy/free-software-even-more-important.html">herkes için
@@ -170,7 +172,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/saying-no-even-once.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/saying-no-even-once.zh-cn.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/saying-no-even-once.zh-cn.html 6 Oct 2020 08:42:12 -0000
1.5
+++ philosophy/saying-no-even-once.zh-cn.html 10 Nov 2020 17:37:38 -0000
1.6
@@ -14,9 +14,11 @@
<address class="byline">Richard Stallman è</address>
<hr class="thin" />
-<p class="italic">æä¸ç§è¯¯è§£ä¸ç´å¨æµä¼ ï¼è¯´ GNU å·¥ç¨è¦æ±ä½
100% è¿è¡ <a
+<blockquote>
+<p>æä¸ç§è¯¯è§£ä¸ç´å¨æµä¼ ï¼è¯´ GNU å·¥ç¨è¦æ±ä½ 100% è¿è¡ <a
href="/philosophy/free-sw.html">èªç±è½¯ä»¶</a>ï¼èä¸æ¯æ¶æ¯å»ãå¦ææ¯
100%
å°ï¼90%?ï¼ï¼é£ä¹æ们就ä¼è¯´ä½
迷失äºæ¹å——ä»ä»¬è¿æ ·è¯´éãè¿å®å
¨ä¸æ¯äºå®ã</p>
+</blockquote>
<p>æ们çç»æç®æ æ¯ <a
href="/philosophy/free-software-even-more-important.html">å
¨äººç±»çæ°åèªç±</a>ï¼ä¸ä¸ªæ²¡æéèªç±è½¯ä»¶çä¸çãæ们ä¸æ人为è¿ä¸ªæ°åèªç±ç®æ
åèµ·æ´»å¨ï¼æç»ææçéèªç±ç¨åºãä¸è¿ï¼å®é
èè¨ï¼å³ä½¿æ¯éåç®æ
çä¸å°æ¥ä¹æ¯å¥½çãåéä¹è¡ï¼å§äºè¶³ä¸ãæ¯æ¬¡ä½ ä¸å®è£
éèªç±ç¨åºï¼æè
å³å®ä¸å¤©ä¸è¿è¡æ个éèªç±ç¨åºï¼è¿æ¯ä½
èªå·±è¿åèªç±çä¸æ¥ãæ¯æ¬¡ä½
æç»åå«äººè¿è¡ä¸ä¸ªéèªç±ç¨åºï¼ä½ å°±åä»ä»¬å±ç¤ºäºç®å
é¿è¿çæ¦æ ·ãè¿æ¯è¿åä¸çèªç±çä¸æ¥ã</p>
@@ -113,7 +115,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/self-interest.fr.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.fr.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- philosophy/self-interest.fr.html 6 Oct 2020 08:42:12 -0000 1.58
+++ philosophy/self-interest.fr.html 10 Nov 2020 17:37:38 -0000 1.59
@@ -28,7 +28,7 @@
trouvons les résumés suivants du point de vue de Smith sur l'intérêt
personnel :</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Loin d'être un individualiste, Smith croyait que c'était l'influence de la
société qui nous transformait en êtres moraux. Il pensait que souvent, nous
nous trompions sur notre propre intérêt personnel.
@@ -37,7 +37,7 @@
<p>
Encore plus à propos :</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Adam Smith] considérait la tentative d'expliquer tout comportement humain
sur les bases de l'intérêt personnel comme peu judicieuse analytiquement et
pernicieuse moralement. <a href="#fn1">[1]</a>
@@ -104,7 +104,7 @@
personnel. D'après Thomas Sowel, un théoricien du marché libre
contemporain :</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Il y a, bien sûr, des valeurs non économiques. Qui plus est, il y a
<em>uniquement</em> des valeurs non économiques. L'économie n'est pas une
valeur en soi, mais simplement une méthode d'échange d'une valeur contre une
@@ -229,7 +229,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/self-interest.ru.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.ru.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/self-interest.ru.html 6 Oct 2020 08:42:12 -0000 1.3
+++ philosophy/self-interest.ru.html 10 Nov 2020 17:37:38 -0000 1.4
@@ -27,7 +27,7 @@
Ð´Ð»Ñ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð½ÐµÐºÐ¾ÑоÑого ÑиÑла
заблÑждений об ÑÑении СмиÑа, Ð¼Ñ Ð½Ð°Ñ
одим
ÑледÑÑÑие ÑоÑмÑлиÑовки взглÑдов СмиÑа на
лиÑнÑе инÑеÑеÑÑ:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Ð¡Ð¼Ð¸Ñ Ð½Ðµ ÑолÑко не бÑл индивидÑалиÑÑом, он
бÑл Ñбежден, ÑÑо именно влиÑние
обÑеÑÑва пÑевÑаÑÐ°ÐµÑ Ð»Ñдей в ÑÑÑеÑÑва
моÑалÑнÑе. Ðн ÑÑиÑал, ÑÑо лÑди ÑаÑÑо
невеÑно ÑÑдÑÑ Ð¾ ÑобÑÑвеннÑÑ
лиÑнÑÑ
инÑеÑеÑаÑ
.
@@ -36,7 +36,7 @@
<p>
ÐÑе ближе к Ñеме:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Ðдам СмиÑ] ÑÑиÑал попÑÑки обÑÑÑнÑÑÑ
вÑÑкое поведение лÑдей на оÑнове лиÑнÑÑ
инÑеÑеÑов аналиÑиÑеÑки оÑибоÑнÑми и
нÑавÑÑвенно вÑеднÑми. <a
href="#fn1">[1]</a>
@@ -99,7 +99,7 @@
Ñвоими лиÑнÑми инÑеÑеÑами или Ñ
оÑÑ Ð±Ñ
ÑмеÑиÑÑ Ð¸Ñ
. ÐовоÑÑ Ñловами ТомаÑа
СоÑÑлла, ÑеоÑеÑика Ñвободного ÑÑнка
наÑего вÑемени,</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ÐÑÑÑ, конеÑно, и неÑкономиÑеÑкие ÑенноÑÑи.
Ð Ñамом деле, ÑÑÑеÑÑвÑÑÑ
<em>ÑолÑко</em> неÑкономиÑеÑкие ÑенноÑÑи.
Ðкономика пÑедÑÑавлÑÐµÑ ÑенноÑÑÑ Ð½Ðµ
Ñама по Ñебе, а ÑолÑко как меÑод Ñазмена
одной ÑенноÑÑи на дÑÑгÑÑ. ÐÑли
@@ -225,7 +225,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/06 08:42:12 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/self-interest.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.zh-cn.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/self-interest.zh-cn.html 6 Oct 2020 08:42:13 -0000 1.6
+++ philosophy/self-interest.zh-cn.html 10 Nov 2020 17:37:38 -0000 1.7
@@ -21,14 +21,14 @@
<p>
åçå°æ¯ï¼“ä¸è½”ãèä¸ï¼æ²¡æä¸ä¸ªç¥åçèªç±å¸åºç论æ¹é¢çä¸å®¶ä¼è®¤ä¸ºå©å·±ä¸»ä¹æ¾ç»ãçè³æå¯è½è¶³ä»¥ç»ç»èªç±ç»æµï¼ææ¯å°å®ç»´æä¸æ®µæ¶é´ãå¨è¿äºç论家ä¸ï¼äºå½ï¼æ¯å¯ç»å¸¸è¢«è®¤ä¸ºæ¯å©å·±ä¸»ä¹ç主è¦å«é士ãä½æ¯å¨ä¸æ¬ç¨æ¥çº
æ£å¯¹å
¶æä¹ç误解ç书ä¸ï¼æ们çå°äºå¯¹ä»çå©å·±ä¸»ä¹è§ç¹çå¦ä¸ç»¼è¿°ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ä¸æ为个人主ä¹è
ç¸æ¯ï¼æ¯å¯è®¤ä¸ºæ¯ç¤¾ä¼çå½±åå°äººè½¬å为éå¾·ççç©ãä»è®¤ä¸ºäººä»¬ç»å¸¸é«ä¼°äºèªå·±ç个人å©çã
</p></blockquote>
<p>
çè³è¿ææ´å¤ç´æ¥ç论述ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[äºå½ï¼æ¯å¯]认为åºäºå©å·±ä¸»ä¹æ¥è§£é人类è¡ä¸ºçå°è¯æ¯åæä¸ç被误导ï¼å¹¶ä¸å¨éå¾·ä¸æ¯æ害çã<a
href="#fn1">[1]</a>
</p></blockquote>
@@ -44,7 +44,7 @@
ææ¶åï¼å¥½äººä¼è®¤ä¸ºäºæ
åºäºå·®éï¼å¹¶å¼å§ä¸ºäºæ个éå¾·ååèææï¼å³ä½¿æ¯æå¿
è¦çºç²æè
è³å°æ¯éå¶ä»ä»¬èªå·±ç个人å©çãç¨å½ä»£çèªç±å¸åºç论家Thomas
Sowellçè¯æ¥è¯´ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ä¸çä¸å½ç¶åå¨éç»æµçä»·å¼ãå®é
ä¸ï¼<em>åª</em>åå¨éç»æµçä»·å¼ãç»æµæ¬èº«ä¸æ¯ä»·å¼ï¼åªæ¯ä¸ç§ä»·å¼äº¤æ¢çæ段ãå¦ææå
³‘éç»æµä»·å¼’ï¼æè
æ´å
·ä½å°è¯´ï¼æ¯‘社ä¼ä»·å¼’æ‘人类价弒ï¼ç论æï¼æ¯ä¸ºäºå¦è®¤è´¸æçå
å¨çå®æ§ï¼ææ¯ä¸ºäºå
é¤è´¸æè¿ç¨ä¸çä¸äºç¹æ®çä»·å¼ï¼é£ä¹è¿ç§æ
ç§ççæ³åªæéè¿ä¸ºå
¶è·å©ç交ææè½æ´ææå°ä½ç°åºæ¥ãè¿å°±æ¯ç»æµçè´¸æã<a
href="#fn2">[2]</a>
</p></blockquote>
@@ -134,7 +134,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/10/06 08:42:13 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/self-interest.zh-tw.html
===================================================================
RCS file: /web/www/www/philosophy/self-interest.zh-tw.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/self-interest.zh-tw.html 6 Oct 2020 08:42:13 -0000 1.6
+++ philosophy/self-interest.zh-tw.html 10 Nov 2020 17:37:38 -0000 1.7
@@ -22,14 +22,14 @@
åçå°æ¯ï¼ä¸è½ãèä¸ï¼ æ²æä¸åç¥åçèªç±å¸å
´çè«æ¹é¢çå°å®¶æèªçºå©å·±ä¸»ç¾©æ¾ç¶ã
çè³æå¯è½è¶³ä»¥çµç¹èªç±ç¶æ¿ï¼ææ¯å°å®ç¶æä¸æ®µæéãå¨éäºçè«å®¶ä¸ï¼
äºç¶â§æ¯å¯ç¶å¸¸è¢«èªçºæ¯å©å·±ä¸»ç¾©ç主è¦çè¡é士ã
ä½æ¯å¨ä¸æ¬ç¨ä¾ç³¾æ£å°ä»çæ義çé¯èª¤ç解çæ¸ä¸ï¼
æåçå°äºé樣çå°æ¼ä»å°å©å·±ä¸»ç¾©çè§é»çè©è¿°ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ãèãæçºå人主義è
ãç¸æ¯ï¼æ¯å¯
èªçºæ¯ç¤¾æçå½±é¿å°äººè½è®çºéå¾·ççç©ã
ä»èªçºäººåç¶å¸¸é«ä¼°äºèªå·±çå©å·±ä¸»ç¾©ãã
</p></blockquote>
<p>
æ´å¤æ´ç´æ¥çè«è¿°å¦ä¸ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ãï¼äºç¶â§æ¯å¯ï¼èªçºåºæ¼å©å·±ä¸»ç¾©ä¾è§£é人é¡è¡çºçå試æ¯å¨åæä¸è¢«èª¤å°çï¼
並ä¸å¨éå¾·ä¸æ¯æ害çãã <a
href="#fn1">[1]</a>
</p></blockquote>
@@ -57,7 +57,7 @@
ææåï¼äººåæèªçºäºæ
åºäºå·®é¯ï¼ä»åéè¦çºäºæåéå¾·æºåèå¥®é¬¥ï¼ æå¿
è¦ç§ç²ï¼æè
è³å°æ¯éå¶èªå·±çå©å·±ä¸»ç¾©ã ç¶ä»£çèªç±å¸å
´çè«å®¶ Thomas
Sowell 說ï¼</p>
-<blockquote class="italic"><p>
+<blockquote><p>
ãä¸çä¸ç¶ç¶åå¨éç¶æ¿çå¹å¼ã確實çï¼åå¨å¯ä¸çéç¶æ¿çå¹å¼ã
ç¶æ¿æ¬èº«ä¸æ¯å¹å¼ï¼åªæ¯ä¸ç¨®å¹å¼è½ç§»ç辦æ³ã
å¦ææéæ¼ãéç¶æ¿å¹å¼ãç說æ³
ï¼æ´å
·é«ç說ï¼æ¯ã社æå¹å¼ãæè
ã人é¡å¹å¼ãï¼ï¼
åªæ¯çºäºå¦èªè²¿æçå
§å¨çç實æ§ï¼ææ¯å¦èªè²¿æéç¨ä¸çä¸äºç¹æ®çå¹å¼ï¼
é£éº¼é種ç¡ç§ççæ³çå¹å¼åªæééèå°æ¤çè趣é²è¡äº¤ææè½æææçé«ç¾åºä¾ã
éå°±æ¯ç¶æ¿ç貿æãã <a href="#fn2">[2]</a>
@@ -148,7 +148,7 @@
<p class="unprintable"><!-- timestamp start -->
æ´æ°æé︰
-$Date: 2020/10/06 08:42:13 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: philosophy/po/saying-no-even-once.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/saying-no-even-once.es-en.html 6 Oct 2020 08:42:16
-0000 1.2
+++ philosophy/po/saying-no-even-once.es-en.html 10 Nov 2020 17:37:38
-0000 1.3
@@ -11,11 +11,13 @@
<address class="byline">by Richard Stallman</address>
<hr class="thin" />
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
Project demands you run 100% <a href="/philosophy/free-sw.html">free
software</a>, all the time. Anything less (90%?), and we will tell
you to get lost—they say. Nothing could be further from the
truth.</p>
+</blockquote>
<p>Our ultimate goal is <a
href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/saying-no-even-once.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/saying-no-even-once.es.po 6 Oct 2020 08:42:16 -0000
1.4
+++ philosophy/po/saying-no-even-once.es.po 10 Nov 2020 17:37:38 -0000
1.5
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-06 21:03-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -37,7 +37,7 @@
msgid "by Richard Stallman"
msgstr "por Richard Stallman"
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
msgid ""
"A misunderstanding is circulating that the GNU Project demands you run 100% "
"<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "
Index: philosophy/po/saying-no-even-once.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/saying-no-even-once.fr-en.html 6 Oct 2020 08:42:16
-0000 1.4
+++ philosophy/po/saying-no-even-once.fr-en.html 10 Nov 2020 17:37:38
-0000 1.5
@@ -11,11 +11,13 @@
<address class="byline">by Richard Stallman</address>
<hr class="thin" />
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
Project demands you run 100% <a href="/philosophy/free-sw.html">free
software</a>, all the time. Anything less (90%?), and we will tell
you to get lost—they say. Nothing could be further from the
truth.</p>
+</blockquote>
<p>Our ultimate goal is <a
href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/saying-no-even-once.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/saying-no-even-once.fr.po 6 Oct 2020 08:42:16 -0000
1.9
+++ philosophy/po/saying-no-even-once.fr.po 10 Nov 2020 17:37:38 -0000
1.10
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-03 00:30+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -34,7 +34,7 @@
msgid "by Richard Stallman"
msgstr "par Richard Stallman"
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
msgid ""
"A misunderstanding is circulating that the GNU Project demands you run 100% "
"<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "
Index: philosophy/po/saying-no-even-once.pot
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/saying-no-even-once.pot 6 Oct 2020 08:42:16 -0000
1.7
+++ philosophy/po/saying-no-even-once.pot 10 Nov 2020 17:37:38 -0000
1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -30,7 +30,7 @@
msgid "by Richard Stallman"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
msgid ""
"A misunderstanding is circulating that the GNU Project demands you run 100% "
"<a href=\"/philosophy/free-sw.html\">free software</a>, all the "
Index: philosophy/po/saying-no-even-once.tr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.tr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/saying-no-even-once.tr-en.html 6 Oct 2020 08:42:16
-0000 1.6
+++ philosophy/po/saying-no-even-once.tr-en.html 10 Nov 2020 17:37:38
-0000 1.7
@@ -11,11 +11,13 @@
<address class="byline">by Richard Stallman</address>
<hr class="thin" />
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
Project demands you run 100% <a href="/philosophy/free-sw.html">free
software</a>, all the time. Anything less (90%?), and we will tell
you to get lost—they say. Nothing could be further from the
truth.</p>
+</blockquote>
<p>Our ultimate goal is <a
href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/saying-no-even-once.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.tr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/saying-no-even-once.tr.po 6 Oct 2020 08:42:16 -0000
1.12
+++ philosophy/po/saying-no-even-once.tr.po 10 Nov 2020 17:37:38 -0000
1.13
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-05 13:57+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -33,7 +33,7 @@
msgid "by Richard Stallman"
msgstr "yazan Richard Stallman"
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
msgid ""
"A misunderstanding is circulating that the GNU Project demands you run 100% "
"<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "
Index: philosophy/po/saying-no-even-once.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.zh-cn-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/saying-no-even-once.zh-cn-en.html 6 Oct 2020 08:42:16
-0000 1.6
+++ philosophy/po/saying-no-even-once.zh-cn-en.html 10 Nov 2020 17:37:38
-0000 1.7
@@ -11,11 +11,13 @@
<address class="byline">by Richard Stallman</address>
<hr class="thin" />
-<p class="italic">A misunderstanding is circulating that the GNU
+<blockquote>
+<p>A misunderstanding is circulating that the GNU
Project demands you run 100% <a href="/philosophy/free-sw.html">free
software</a>, all the time. Anything less (90%?), and we will tell
you to get lost—they say. Nothing could be further from the
truth.</p>
+</blockquote>
<p>Our ultimate goal is <a
href="/philosophy/free-software-even-more-important.html">digital
@@ -145,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/saying-no-even-once.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/saying-no-even-once.zh-cn.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/saying-no-even-once.zh-cn.po 6 Oct 2020 08:42:16 -0000
1.13
+++ philosophy/po/saying-no-even-once.zh-cn.po 10 Nov 2020 17:37:38 -0000
1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: saying-no-even-once.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-06-03 14:37+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -29,7 +29,7 @@
msgid "by Richard Stallman"
msgstr "Richard Stallman è"
-#. type: Content of: <p>
+#. type: Content of: <blockquote><p>
msgid ""
"A misunderstanding is circulating that the GNU Project demands you run 100% "
"<a href=\"/philosophy/free-sw.html\">free software</a>, all the time. "
Index: philosophy/po/self-interest.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.fr-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/po/self-interest.fr-en.html 6 Oct 2020 08:42:16 -0000
1.34
+++ philosophy/po/self-interest.fr-en.html 10 Nov 2020 17:37:38 -0000
1.35
@@ -24,7 +24,7 @@
we find the following summaries of Smith's view about
self-interest:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Far from being an individualist, Smith believed it is the influence
of society that transforms people into moral beings. He thought that
people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
<p>
Even more directly to the point:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Adam Smith] regarded the attempt to explain all human behavior on
the basis of self-interest as analytically misguided and morally
pernicious. <a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
to sacrifice, or at least qualify, their own self-interest. In the
words of Thomas Sowell, a free-market theorist of our time:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
There are, of course, noneconomic values. Indeed, there are
<em>only</em> noneconomic values. Economics is not a value itself but
merely a method of trading off one value against another. If
@@ -201,7 +201,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/self-interest.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.ru-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.ru-en.html 6 Oct 2020 08:42:16 -0000
1.3
+++ philosophy/po/self-interest.ru-en.html 10 Nov 2020 17:37:38 -0000
1.4
@@ -24,7 +24,7 @@
we find the following summaries of Smith's view about
self-interest:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Far from being an individualist, Smith believed it is the influence
of society that transforms people into moral beings. He thought that
people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
<p>
Even more directly to the point:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Adam Smith] regarded the attempt to explain all human behavior on
the basis of self-interest as analytically misguided and morally
pernicious. <a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
to sacrifice, or at least qualify, their own self-interest. In the
words of Thomas Sowell, a free-market theorist of our time:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
There are, of course, noneconomic values. Indeed, there are
<em>only</em> noneconomic values. Economics is not a value itself but
merely a method of trading off one value against another. If
@@ -201,7 +201,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/self-interest.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.zh-cn-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.zh-cn-en.html 6 Oct 2020 08:42:16 -0000
1.3
+++ philosophy/po/self-interest.zh-cn-en.html 10 Nov 2020 17:37:38 -0000
1.4
@@ -24,7 +24,7 @@
we find the following summaries of Smith's view about
self-interest:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Far from being an individualist, Smith believed it is the influence
of society that transforms people into moral beings. He thought that
people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
<p>
Even more directly to the point:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Adam Smith] regarded the attempt to explain all human behavior on
the basis of self-interest as analytically misguided and morally
pernicious. <a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
to sacrifice, or at least qualify, their own self-interest. In the
words of Thomas Sowell, a free-market theorist of our time:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
There are, of course, noneconomic values. Indeed, there are
<em>only</em> noneconomic values. Economics is not a value itself but
merely a method of trading off one value against another. If
@@ -201,7 +201,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/self-interest.zh-tw-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/self-interest.zh-tw-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/self-interest.zh-tw-en.html 6 Oct 2020 08:42:16 -0000
1.3
+++ philosophy/po/self-interest.zh-tw-en.html 10 Nov 2020 17:37:38 -0000
1.4
@@ -24,7 +24,7 @@
we find the following summaries of Smith's view about
self-interest:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
Far from being an individualist, Smith believed it is the influence
of society that transforms people into moral beings. He thought that
people often misjudge their own self-interest.
@@ -33,7 +33,7 @@
<p>
Even more directly to the point:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
[Adam Smith] regarded the attempt to explain all human behavior on
the basis of self-interest as analytically misguided and morally
pernicious. <a href="#fn1">[1]</a>
@@ -97,7 +97,7 @@
to sacrifice, or at least qualify, their own self-interest. In the
words of Thomas Sowell, a free-market theorist of our time:</p>
-<blockquote class="italic"><p>
+<blockquote><p>
There are, of course, noneconomic values. Indeed, there are
<em>only</em> noneconomic values. Economics is not a value itself but
merely a method of trading off one value against another. If
@@ -201,7 +201,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:16 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/malware-games.es.html 3 Nov 2020 12:00:39 -0000 1.11
+++ proprietary/malware-games.es.html 10 Nov 2020 17:37:38 -0000 1.12
@@ -60,13 +60,13 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Entre las numerosas funcionalidades maliciosas que se encuentran en los
juegos, quizá la peor sea la <a
href="/proprietary/proprietary-addictions.html#addictiveness">adictividad</a>,
pues afecta a los usuarios no solo materialmente, sino también
psicológicamente.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -426,7 +426,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/03 12:00:39 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-games.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/malware-games.fr.html 2 Nov 2020 18:03:07 -0000 1.49
+++ proprietary/malware-games.fr.html 10 Nov 2020 17:37:38 -0000 1.50
@@ -59,12 +59,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Parmi les nombreuses fonctionnalités malveillantes des jeux, l'<a
href="/proprietary/proprietary-addictions.html#addictiveness">addictivité</a>
est peut-être la pire, car elle affecte l'utilisateur sur le plan
psychologique aussi bien que matériel.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -425,7 +425,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/malware-games.ru.html 2 Nov 2020 18:03:07 -0000 1.47
+++ proprietary/malware-games.ru.html 10 Nov 2020 17:37:38 -0000 1.48
@@ -60,12 +60,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>СÑеди многоÑиÑленнÑÑ
вÑедоноÑнÑÑ
ÑÑнкÑий, налиÑеÑÑвÑÑÑиÑ
в игÑаÑ
, <a
href="/proprietary/proprietary-addictions.html#addictiveness">
вÑÑабоÑка
завиÑимоÑÑи</a>, возможно, ÑÐ°Ð¼Ð°Ñ Ñ
ÑдÑаÑ,
поÑколÑÐºÑ Ð¾Ð½Ð° воздейÑÑвÑÐµÑ Ð½Ð°
полÑзоваÑелей не ÑолÑко маÑеÑиалÑно, но и
пÑиÑ
иÑеÑки.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -427,7 +427,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/malware-mobiles.es.html 17 Oct 2020 12:00:46 -0000 1.80
+++ proprietary/malware-mobiles.es.html 10 Nov 2020 17:37:38 -0000 1.81
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Casi todos los teléfonos móviles causan dos serios agravios a los
usuarios:
rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los
llamamos «el sueño de Stalin».</p>
@@ -73,7 +73,7 @@
<a href="/proprietary/malware-apple.html">Los sistemas operativos de Apple
son <cite>malware</cite></a> y <a href="/proprietary/malware-google.html">El
software de Google es <cite>malware</cite></a>, respectivamente.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -1352,7 +1352,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/17 12:00:46 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/malware-mobiles.fr.html 17 Oct 2020 08:59:36 -0000 1.109
+++ proprietary/malware-mobiles.fr.html 10 Nov 2020 17:37:38 -0000 1.110
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Presque tous les téléphones mobiles nuisent gravement à leurs
utilisateurs
de deux manières : ils suivent leurs mouvements et ils écoutent leurs
conversations. C'est pourquoi nous les appelons « le rêve de StalineÂ
».</p>
@@ -72,7 +72,7 @@
d'exploitation d'Apple</a> et <a
href="/proprietary/malware-google.html">Malveillance des logiciels de
Google</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -1347,7 +1347,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/malware-mobiles.ru.html 19 Oct 2020 10:00:04 -0000 1.103
+++ proprietary/malware-mobiles.ru.html 10 Nov 2020 17:37:38 -0000 1.104
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐоÑÑи вÑе мобилÑнÑе ÑелеÑÐ¾Ð½Ñ Ð¿ÑиÑинÑÑÑ
две ÑеÑÑезнÑÑ
неÑпÑаведливоÑÑи Ñвоим
полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑениÑ
и пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ. ÐоÑ
поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”.</p>
@@ -72,7 +72,7 @@
href="/proprietary/malware-apple.html">ÐпеÑаÑионнÑе ÑиÑÑемÑ
Apple
вÑедоноÑнÑ</a> и <a
href="/proprietary/malware-google.html">ÐÑогÑÐ°Ð¼Ð¼Ñ Google
вÑедоноÑнÑ</a>, ÑооÑвеÑÑÑвенно.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -1334,7 +1334,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-webpages.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/malware-webpages.es.html 24 Jun 2020 05:02:24 -0000
1.3
+++ proprietary/malware-webpages.es.html 10 Nov 2020 17:37:38 -0000
1.4
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>En esta página se muestran ejemplos de sitios web que contienen programas
JavaScript que espÃan a los usuarios o los engañan. Utilizan lo que nosotros
llamamos <a href="/philosophy/javascript-trap.html">la trampa de
JavaScript</a>. Por supuesto que muchos sitios recogen la información que
los usuarios envÃan, por ejemplo, mediante formularios, pero aquà no
hablamos de eso.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -319,7 +319,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/malware-webpages.fr.html 5 Oct 2020 13:13:24 -0000
1.24
+++ proprietary/malware-webpages.fr.html 10 Nov 2020 17:37:38 -0000
1.25
@@ -59,14 +59,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cette page répertorie des sites web contenant des programmes JavaScript qui
espionnent les utilisateurs ou les trompent. Ils se servent de ce que nous
appelons <a href="/philosophy/javascript-trap.html">le piège
JavaScript</a>. Bien entendu, beaucoup de sites collectent de l'information
envoyée par l'utilisateur, entre autres au moyen de formulaires, mais ce
n'est pas ce dont nous voulons parler ici.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -314,7 +314,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/malware-webpages.ru.html 24 Jun 2020 05:04:03 -0000
1.21
+++ proprietary/malware-webpages.ru.html 10 Nov 2020 17:37:38 -0000
1.22
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑÐ»ÐµÐ½Ñ ÑайÑÑ,
ÑодеÑжаÑие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, коÑоÑÑе ÑпионÑÑ Ð·Ð° полÑзоваÑелÑми и
вводÑÑ Ð¸Ñ
в заблÑждение. Ðни
полÑзÑÑÑÑÑ Ñем, ÑÑо Ð¼Ñ Ð½Ð°Ð·Ñваем <a
href="/philosophy/javascript-trap.html">западней JavaScript</a>. Ð
азÑмееÑÑÑ,
многие ÑайÑÑ ÑобиÑаÑÑ Ð¸Ð½ÑоÑмаÑиÑ, коÑоÑÑÑ
пÑиÑÑÐ»Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ (ÑеÑез
ÑоÑÐ¼Ñ Ð¸ дÑÑгими ÑпоÑобами), но Ð¼Ñ Ð³Ð¾Ð²Ð¾Ñим
не об ÑÑом.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -314,7 +314,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/potential-malware.es.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/potential-malware.es.html 24 Jun 2020 05:02:24 -0000
1.4
+++ proprietary/potential-malware.es.html 10 Nov 2020 17:37:38 -0000
1.5
@@ -60,11 +60,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>En esta página se describen técnicas maliciosas que se podrÃan
utilizar en
el software privativo con fines maliciosos. No tenemos evidencia de que ya
estén en uso.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -212,7 +212,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/potential-malware.fr.html 5 Oct 2020 13:13:24 -0000
1.18
+++ proprietary/potential-malware.fr.html 10 Nov 2020 17:37:38 -0000
1.19
@@ -59,11 +59,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cette page décrit des techniques que le logiciel privateur pourrait
utiliser
dans le futur à des fins malveillantes. Nous n'avons pas la preuve qu'elles
soient déjà employées actuellement.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -211,7 +211,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/potential-malware.ru.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/potential-malware.ru.html 24 Jun 2020 05:04:03 -0000
1.18
+++ proprietary/potential-malware.ru.html 10 Nov 2020 17:37:38 -0000
1.19
@@ -60,11 +60,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðа ÑÑой ÑÑÑаниÑе опиÑÐ°Ð½Ñ Ð²ÑедоноÑнÑе
пÑиемÑ, коÑоÑÑе неÑвободнÑе пÑогÑаммÑ
могли Ð±Ñ Ð¿ÑименÑÑÑ Ð² бÑдÑÑем во ÑелÑÑ
вÑедиÑелÑÑÑва. У Ð½Ð°Ñ Ð½ÐµÑ ÑвидеÑелÑÑÑв,
ÑÑо они Ñже пÑименÑÑÑÑÑ.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -215,7 +215,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-addictions.es.html 29 Oct 2020 11:29:54 -0000
1.20
+++ proprietary/proprietary-addictions.es.html 10 Nov 2020 17:37:38 -0000
1.21
@@ -61,12 +61,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Esta página se ocupa de las funcionalidades maliciosas que se añaden a
algunos programas con el único propósito de seducir a los usuarios para que
utilicen el programa de manera más frecuente e intensiva, con el riesgo de
caer en la adicción.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -398,7 +398,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/29 11:29:54 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-addictions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.fr.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary-addictions.fr.html 29 Oct 2020 09:00:31 -0000
1.25
+++ proprietary/proprietary-addictions.fr.html 10 Nov 2020 17:37:38 -0000
1.26
@@ -59,11 +59,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cette page s'intéresse aux fonctionnalités malveillantes ajoutées Ã
certains
programmes dans le seul but d'amener les utilisateurs à les utiliser de
manière de plus en plus intensive, au risque d'en devenir dépendants.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -390,7 +390,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/29 09:00:31 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-addictions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.ru.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/proprietary-addictions.ru.html 29 Oct 2020 11:00:28 -0000
1.26
+++ proprietary/proprietary-addictions.ru.html 10 Nov 2020 17:37:38 -0000
1.27
@@ -60,12 +60,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐÑа ÑÑÑаниÑа обÑÑÐ¶Ð´Ð°ÐµÑ Ð²ÑедоноÑнÑе
ÑÑнкÑии, добавлÑемÑе к некоÑоÑÑм
пÑогÑаммам единÑÑвенно Ñ ÑелÑÑ
ÑÐ¾Ð±Ð»Ð°Ð·Ð½ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей вÑе ÑаÑе и ÑаÑе и
инÑенÑивнее полÑзоваÑÑÑÑ
пÑогÑаммой — Ñ ÑиÑком полÑÑениÑ
завиÑимоÑÑи.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -390,7 +390,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/29 11:00:28 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-addictions.tr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.tr.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-addictions.tr.html 29 Oct 2020 17:01:53 -0000
1.9
+++ proprietary/proprietary-addictions.tr.html 10 Nov 2020 17:37:38 -0000
1.10
@@ -60,11 +60,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Bu sayfa; yalnızca kullanıcılarda baÄımlılık yapma riskiyle birlikte
kullanıcıları, programı daha sık ve yoÄun bir Åekilde kullanmaya
yönlendirmek amacıyla bazı programlara eklenen kötücül iÅlevlerle
ilgilidir.</p>
-</div>
+</blockquote>
<div class="important">
<p>Bu sayfada olması gereken ancak burada olmayan bir örnek biliyorsanız
lütfen
@@ -392,7 +392,7 @@
<p class="unprintable"><!-- timestamp start -->
Son Güncelleme:
-$Date: 2020/10/29 17:01:53 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/proprietary-back-doors.es.html 18 Oct 2020 09:59:19 -0000
1.23
+++ proprietary/proprietary-back-doors.es.html 10 Nov 2020 17:37:38 -0000
1.24
@@ -61,14 +61,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>En algunas funcionalidades maliciosas intervienen <a
href="/proprietary/proprietary.html#f1">puertas traseras</a>. Se presentan
aquà ejemplos de programas que contienen una o varias de ellas, clasificados
según lo que sabemos que esas puertas traseras son capaces de hacer. A las
puertas traseras que permiten un control total de los programas que las
contienen se las llama «universales».</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -761,7 +761,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/proprietary-back-doors.fr.html 17 Oct 2020 08:59:36 -0000
1.89
+++ proprietary/proprietary-back-doors.fr.html 10 Nov 2020 17:37:38 -0000
1.90
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Certaines fonctionnalités malveillantes font intervenir des <a
href="/proprietary/proprietary.html#f1">portes dérobées</a>. Voici des
exemples de programmes privateurs qui en contiennent une ou plusieurs,
classées d'après ce qu'elles ont le pouvoir de faire. Les portes dérobées
qui permettent de prendre totalement le contrôle des programme qui les
contiennent sont dites « universelles ».</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -764,7 +764,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/proprietary-back-doors.ru.html 19 Oct 2020 10:00:04 -0000
1.83
+++ proprietary/proprietary-back-doors.ru.html 10 Nov 2020 17:37:38 -0000
1.84
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐекоÑоÑÑе вÑедоноÑнÑе ÑÑнкÑии
опоÑÑÐµÐ´Ð¾Ð²Ð°Ð½Ñ <a
href="/proprietary/proprietary.html#f1">лазейками</a>. ÐдеÑÑ
пÑиведенÑ
пÑимеÑÑ Ð»Ð°Ð·ÐµÐµÐº, коÑоÑÑе ÑодеÑÐ¶Ð°Ñ Ð¾Ð´Ð½Ñ Ð¸Ð»Ð¸
неÑколÑко ÑакиÑ
лазеек. Ðни
ÑазбиÑÑ Ð½Ð° гÑÑÐ¿Ð¿Ñ Ð¿Ð¾ ÑомÑ, ÑÑо они
(наÑколÑко нам извеÑÑно)
позволÑÑÑ. Ðазейки, коÑоÑÑе допÑÑкаÑÑ
полнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑодеÑжаÑими иÑ
пÑогÑаммами, обознаÑÐµÐ½Ñ ÐºÐ°Ðº
“ÑнивеÑÑалÑнÑе”.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -753,7 +753,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-censorship.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-censorship.ru.html 10 Nov 2020 13:30:52 -0000
1.32
+++ proprietary/proprietary-censorship.ru.html 10 Nov 2020 17:37:38 -0000
1.33
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðдин из видов вÑедоноÑнÑÑ
ÑÑнкÑий —
ÑензÑÑа доÑÑÑпа
полÑзоваÑелей.ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð¿ÑогÑамм,
коÑоÑÑе ÑÑо делаÑÑ. У Ð½Ð°Ñ ÐµÑÑÑ <a
href="/proprietary/proprietary-jails.html#about-page"> оÑделÑнÑй
ÑпиÑок
@@ -69,7 +69,7 @@
<p>ÐÑодажа пÑодÑкÑов, ÑпÑоекÑиÑованнÑÑ
как
плаÑÑоÑма Ð´Ð»Ñ Ð½Ð°Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹
ÑензÑÑÑ, должна бÑÑÑ Ð·Ð°Ð¿ÑеÑена законом, но
ÑÑо не запÑеÑено.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -232,7 +232,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/11/10 13:30:52 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-coverups.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-coverups.es.html 24 Jun 2020 05:02:25 -0000
1.5
+++ proprietary/proprietary-coverups.es.html 10 Nov 2020 17:37:38 -0000
1.6
@@ -61,11 +61,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>En esta página se muestran ejemplos en los que el software privativo tenÃa
un error de programación, y los desarrolladores, al intentar ocultar su
existencia, lo convirtieron en una funcionalidad maliciosa.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -161,7 +161,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-coverups.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/proprietary-coverups.fr.html 5 Oct 2020 13:13:24 -0000
1.18
+++ proprietary/proprietary-coverups.fr.html 10 Nov 2020 17:37:38 -0000
1.19
@@ -59,11 +59,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cette page répertorie des cas où le logiciel privateur avait un bogue que
les développeurs ont transformé en fonctionnalité malveillante en essayant
de dissimuler son existence.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -159,7 +159,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-coverups.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.ru.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-coverups.ru.html 24 Jun 2020 05:04:03 -0000
1.15
+++ proprietary/proprietary-coverups.ru.html 10 Nov 2020 17:37:38 -0000
1.16
@@ -60,11 +60,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑÐ»ÐµÐ½Ñ Ð¿ÑимеÑÑ
Ñого, как в неÑвободной пÑогÑамме бÑла
оÑибка, а ÑазÑабоÑÑики пÑевÑаÑили ÑÑо во
вÑедоноÑнÑÑ ÑÑнкÑиÑ, пÑÑаÑÑÑ ÑкÑÑÑÑ
ÑÑÑеÑÑвование оÑибки.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -161,7 +161,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-deception.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-deception.es.html 24 Jul 2020 09:00:28 -0000
1.11
+++ proprietary/proprietary-deception.es.html 10 Nov 2020 17:37:38 -0000
1.12
@@ -60,13 +60,13 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Las trampas son funcionalidades maliciosas que hacen que el programa sea
deshonesto o que utilizan artimañas. Los casos de trampas que tratan de
sacar dinero a la gente están listados en <a
href="/proprietary/proprietary-fraud.html#main-heading">Fraude en el
software privativo</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -243,7 +243,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/07/24 09:00:28 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/proprietary-deception.fr.html 5 Oct 2020 13:13:24 -0000
1.39
+++ proprietary/proprietary-deception.fr.html 10 Nov 2020 17:37:38 -0000
1.40
@@ -59,14 +59,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Voici des exemples de fonctionnalités malveillantes rendent le programme
malhonnête ou cachent un piège. Les cas de tromperie qui vont jusqu'Ã
soutirer de l'argent aux utilisateurs sont répertoriés sur une page
spéciale : <a
href="/proprietary/proprietary-fraud.html#main-heading">Escroqueries du
logiciel privateur</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -243,7 +243,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/proprietary-deception.ru.html 23 Jul 2020 09:30:18 -0000
1.36
+++ proprietary/proprietary-deception.ru.html 10 Nov 2020 17:37:38 -0000
1.37
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðбман — вÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ,
коÑоÑÐ°Ñ Ð·Ð°ÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð²ÐµÑÑи
ÑÐµÐ±Ñ Ð½ÐµÑеÑÑно или ÑкÑÑваеÑ
надÑваÑелÑÑÑво. ÐÐ¾Ñ Ð¿ÑимеÑÑ ÑакиÑ
вÑедоноÑнÑÑ
ÑÑнкÑий. СлÑÑаи обмана, коÑоÑÑе ÑвÑÐ·Ð°Ð½Ñ Ñ
пÑиÑвоением ÑÑжиÑ
денег,
ÑаÑÑмоÑÑÐµÐ½Ñ Ð² Ñазделе <a
href="/proprietary/proprietary-fraud.html#main-heading">
ÐоÑенниÑеÑÑво в
неÑвободнÑÑ
пÑогÑаммаÑ
</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -242,7 +242,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/07/23 09:30:18 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-drm.es.html 18 Oct 2020 09:59:19 -0000 1.7
+++ proprietary/proprietary-drm.es.html 10 Nov 2020 17:37:38 -0000 1.8
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>En esta página se muestran ejemplos de sistemas y programas privativos que
aplican la <em>gestión digital de restricciones</em> (<abbr title="Digital
Restrictions Management">DRM</abbr>): funcionalidades deliberadamente
@@ -76,7 +76,7 @@
declarar ilegal. Apoye nuestra campaña para <a
href="http://DefectiveByDesign.org/">abolir el DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -442,7 +442,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/proprietary-drm.fr.html 17 Oct 2020 08:59:36 -0000 1.47
+++ proprietary/proprietary-drm.fr.html 10 Nov 2020 17:37:38 -0000 1.48
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Voici des exemples de programmes et de systèmes privateurs qui mettent en
Åuvre la <em>gestion numérique des restrictions</em> (<abbr title="Digital
Restrictions Management">DRM</abbr>), autrement dit des fonctionnalités
@@ -74,7 +74,7 @@
promulguer. Merci de soutenir notre campagne pour <a
href="http://DefectiveByDesign.org/">l'abolition des DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -441,7 +441,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/proprietary-drm.ru.html 19 Oct 2020 10:00:04 -0000 1.45
+++ proprietary/proprietary-drm.ru.html 10 Nov 2020 17:37:38 -0000 1.46
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм и
ÑиÑÑем, ÑеализÑÑÑиÑ
<em>ÑиÑÑовое
ÑпÑавление огÑаниÑениÑми</em>: ÑÑнкÑии,
наÑоÑно ÑпÑоекÑиÑованнÑе длÑ
огÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо могÑÑ Ð´ÐµÐ»Ð°ÑÑ
полÑзоваÑели. ÐÑи ÑÑнкÑии назÑваÑÑÑÑ
@@ -76,7 +76,7 @@
href="http://DefectiveByDesign.org/"> ÑпÑазднение
ÑиÑÑового ÑпÑавлениÑ
огÑаниÑениÑми</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -451,7 +451,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-fraud.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-fraud.es.html 24 Jun 2020 05:02:25 -0000
1.5
+++ proprietary/proprietary-fraud.es.html 10 Nov 2020 17:37:38 -0000
1.6
@@ -60,10 +60,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Se presentan aquà ejemplos de software privativo que estafa a los
usuarios
mediante el uso de trucos para quitarles el dinero.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -164,7 +164,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-fraud.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-fraud.fr.html 5 Oct 2020 13:13:24 -0000
1.5
+++ proprietary/proprietary-fraud.fr.html 10 Nov 2020 17:37:38 -0000
1.6
@@ -59,10 +59,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Voici des exemples de logiciels privateurs qui escroquent les
utilisateurs,
qui leur prennent leur argent par la ruse.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -163,7 +163,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-fraud.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-fraud.ru.html 24 Jun 2020 05:04:03 -0000
1.4
+++ proprietary/proprietary-fraud.ru.html 10 Nov 2020 17:37:38 -0000
1.5
@@ -60,10 +60,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
коÑоÑÑе моÑенниÑаÑÑ Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми,
обманом забиÑÐ°Ñ Ð¸Ñ
денÑги.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -166,7 +166,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-incompatibility.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-incompatibility.es.html 24 Jun 2020 05:02:25
-0000 1.6
+++ proprietary/proprietary-incompatibility.es.html 10 Nov 2020 17:37:38
-0000 1.7
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Una de estas funcionalidades maliciosas es la intencionada incompatibilidad
de un programa con software de terceros que opera con el mismo tipo de
datos.</p>
@@ -86,7 +86,7 @@
artificiales</a> a la interoperabilidad de sus productos con el propósito de
monopolizar el mercado, y esto lo consiguen a menudo mediante
<cite>malware</cite> privativo.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -204,7 +204,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:38 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-incompatibility.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-incompatibility.fr.html 5 Oct 2020 13:13:24
-0000 1.21
+++ proprietary/proprietary-incompatibility.fr.html 10 Nov 2020 17:37:39
-0000 1.22
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>L'une de ces fonctionnalités malveillantes est l'incompatibilité
délibérée
d'un programme avec d'autres logiciels qui utilisent le même type de
données.</p>
@@ -86,7 +86,7 @@
href="https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies">restrictions
artificielles</a> à l'interopérabilité de leurs produits, souvent au moyen
de logiciel malveillant privateur, pour obtenir le monopole du marché.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -203,7 +203,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:24 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-incompatibility.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/proprietary-incompatibility.ru.html 24 Jun 2020 05:04:03
-0000 1.16
+++ proprietary/proprietary-incompatibility.ru.html 10 Nov 2020 17:37:39
-0000 1.17
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðдна из вÑедоноÑнÑÑ
ÑÑнкÑий —
пÑеднамеÑÐµÐ½Ð½Ð°Ñ Ð½ÐµÑовмеÑÑимоÑÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¿ÑогÑаммами ÑÑеÑÑиÑ
ÑÑоÑон,
коÑоÑÑе ÑабоÑаÑÑ Ñ Ñеми же Ñипами
даннÑÑ
.</p>
@@ -86,7 +86,7 @@
иÑкÑÑÑÑвеннÑе огÑаниÑениÑ</a> на
взаимодейÑÑвие иÑ
пÑодÑкÑов Ñ Ð´ÑÑгими,
ÑÑÐ¾Ð±Ñ Ð¼Ð¾Ð½Ð¾Ð¿Ð¾Ð»Ð¸Ð·Ð¸ÑоваÑÑ ÑÑнок, и ÑÑо ÑаÑÑо
доÑÑигаеÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -206,7 +206,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:03 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-insecurity.es.html 18 Oct 2020 09:59:19 -0000
1.17
+++ proprietary/proprietary-insecurity.es.html 10 Nov 2020 17:37:39 -0000
1.18
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Esta página ofrece una lista de casos comprobados de inseguridad en el
software privativo con graves consecuencias o dignos de mención. Aun cuando
la mayor parte de estos fallos de seguridad no son intencionados, de modo
@@ -74,7 +74,7 @@
usuarios se ven <em>imposibilitados para subsanar cualquier problema de
seguridad que surja</em>. El software privativo es culpable de mantener a
los usuarios en la indefensión.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -831,7 +831,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/proprietary-insecurity.fr.html 17 Oct 2020 08:59:36 -0000
1.103
+++ proprietary/proprietary-insecurity.fr.html 10 Nov 2020 17:37:39 -0000
1.104
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cette page répertorie des failles de sécurité de logiciels privateurs,
failles clairement établies qui ont de graves conséquences ou méritent
d'être mentionnées pour d'autres raisons. Bien que la plupart de ces failles
@@ -74,7 +74,7 @@
corriger eux-mêmes les problèmes de sécurité qui pourraient survenir</em>.
C'est le fait de priver les utilisateurs de cette possibilité qui est
coupable dans le logiciel privateur.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -828,7 +828,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/proprietary-insecurity.ru.html 19 Oct 2020 10:00:04 -0000
1.92
+++ proprietary/proprietary-insecurity.ru.html 10 Nov 2020 17:37:39 -0000
1.93
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑлÑÑÑÑÑ ÑÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи
неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе имели
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ пÑимеÑаÑелÑÐ½Ñ Ð¿Ð¾
дÑÑгим пÑиÑинам. ХоÑÑ Ð±Ð¾Ð»ÑÑинÑÑво из ÑÑиÑ
пÑоÑеÑ
безопаÑноÑÑи
@@ -73,7 +73,7 @@
полÑзоваÑели <em>беÑпомоÑÐ½Ñ Ð¿Ñи необÑ
одимоÑÑи иÑпÑавиÑÑ Ð»ÑбÑе пÑоблемÑ
безопаÑноÑÑи, коÑоÑÑе возникаÑÑ</em>. Ðменно
Ñо, ÑÑо полÑзоваÑелей оÑÑавлÑÑÑ
беÑпомоÑнÑми, доÑÑойно поÑиÑÐ°Ð½Ð¸Ñ Ð²
неÑвободнÑÑ
пÑогÑаммаÑ
.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -814,7 +814,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-interference.es.html 18 Oct 2020 09:59:19
-0000 1.9
+++ proprietary/proprietary-interference.es.html 10 Nov 2020 17:37:39
-0000 1.10
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Un tipo de funcionalidad maliciosa es la que permite la injerencia del
desarrollador en la utilización del software. Esta página describe el modo
en que diversos programas privativos importunan, molestan o causan problemas
@@ -68,7 +68,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotaje</a>, pero la
palabra «sabotaje» es demasiado fuerte para referirse a ellas.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -360,7 +360,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-interference.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.fr.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/proprietary-interference.fr.html 17 Oct 2020 08:59:36
-0000 1.55
+++ proprietary/proprietary-interference.fr.html 10 Nov 2020 17:37:39
-0000 1.56
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Parmi ces fonctionnalités malveillantes, il y a celles qui rendent possible
l'ingérence du développeur dans l'utilisation du logiciel. Cette page décrit
comment divers programmes privateurs importunent ou harcèlent l'utilisateur,
@@ -67,7 +67,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, mais le
mot « sabotage » est trop fort.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -358,7 +358,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/proprietary-interference.ru.html 19 Oct 2020 10:00:04
-0000 1.46
+++ proprietary/proprietary-interference.ru.html 10 Nov 2020 17:37:39
-0000 1.47
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðдна из ÑазновидноÑÑей вÑедоноÑнÑÑ
ÑÑнкÑий пÑедÑÑавлÑÐµÑ Ð²Ð¼ÐµÑаÑелÑÑÑво
ÑазÑабоÑÑика в полÑзование пÑогÑаммами.
Ðа ÑÑой ÑÑÑаниÑе опиÑано, как
ÑазлиÑнÑе неÑвободнÑе пÑогÑаммÑ
доÑаждаÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, надоедаÑÑ ÐµÐ¼Ñ Ð¸Ð»Ð¸
@@ -68,7 +68,7 @@
href="/proprietary/proprietary-sabotage#about-page">ÑабоÑаж</a>, но
Ñлово
“ÑабоÑаж” Ð´Ð»Ñ Ð½Ð¸Ñ
ÑлиÑком ÑилÑно.
</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -354,7 +354,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/proprietary-jails.es.html 8 Nov 2020 10:29:08 -0000
1.40
+++ proprietary/proprietary-jails.es.html 10 Nov 2020 17:37:39 -0000
1.41
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Las «prisiones» son sistemas operativos maliciosos diseñados para
imponer la
censura sobre qué aplicaciones se le permite al usuario instalar. Esta <a
href="http://i.imgur.com/ZRViDum.jpg">imagen de una iPrisión</a> ilustra el
@@ -76,7 +76,7 @@
<p>En esta página se listan unas pocas prisiones, con algunos de los métodos
que emplean para censurar aplicaciones, y se incluyen ejemplos concretos de
aplicaciones que han sido bloqueadas haciendo uso de ese poder de censura.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo que deberÃa mencionarse en esta página y no
está,
@@ -396,7 +396,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/proprietary-jails.fr.html 7 Nov 2020 13:01:45 -0000
1.47
+++ proprietary/proprietary-jails.fr.html 10 Nov 2020 17:37:39 -0000
1.48
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Les prisons sont des systèmes d'exploitation malveillants conçus pour
limiter le choix d'applications installables par l'utilisateur. Une <a
href="http://i.imgur.com/ZRViDum.jpg">image de l'iPrison</a> illustre ce
@@ -75,7 +75,7 @@
<p>Cette page recense quelques prisons, ainsi que les méthodes qu'elles
utilisent pour censurer les applis, et donne des exemples d'applis qui ont
été bloquées au moyen de ce système de censure.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -398,7 +398,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/11/07 13:01:45 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ru.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/proprietary-jails.ru.html 7 Nov 2020 11:30:43 -0000
1.45
+++ proprietary/proprietary-jails.ru.html 10 Nov 2020 17:37:39 -0000
1.46
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>“ТÑÑÑмє — ÑÑо вÑедоноÑнÑе
опеÑаÑионнÑе ÑиÑÑемÑ,
коÑоÑÑе ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ñак, ÑÑобÑ
налагаÑÑ ÑензÑÑÑ Ð½Ð° Ñо, какие пÑиложениÑ
Ð¼Ð¾Ð¶ÐµÑ ÑÑÑанавливаÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ. <a
@@ -76,7 +76,7 @@
<p>Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑлено неÑколÑко
ÑÑÑем Ñ Ð½ÐµÐºÐ¾ÑоÑÑми меÑодами,
пÑименÑемÑми в ниÑ
Ð´Ð»Ñ ÑензÑÑÑ Ð¿Ñиложений,
а Ñакже конкÑеÑнÑми пÑимеÑами
пÑиложений, заблокиÑованнÑÑ
влаÑÑÑÑ ÑÑой
ÑензÑÑÑ.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -404,7 +404,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/11/07 11:30:43 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-manipulation.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-manipulation.es.html 24 Jun 2020 05:02:25
-0000 1.5
+++ proprietary/proprietary-manipulation.es.html 10 Nov 2020 17:37:39
-0000 1.6
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>La manipulación de los usuarios es una de estas funcionalidades
maliciosas. Aquà se presentan ejemplos de programas que se han diseñado para
hacerlo aprovechando caracterÃsticas de la psicologÃa humana.</p>
@@ -70,7 +70,7 @@
href="/proprietary/proprietary-addictions.html">programas adictivos</a>, que
también aprovechan caracterÃsticas de la psicologÃa humana, pero de forma
mucho más elaborada y peligrosa.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -190,7 +190,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-manipulation.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.fr.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-manipulation.fr.html 5 Oct 2020 13:13:25
-0000 1.7
+++ proprietary/proprietary-manipulation.fr.html 10 Nov 2020 17:37:39
-0000 1.8
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>La manipulation des utilisateurs est l'une de ces fonctionnalités
malveillantes. Voici des exemples de programmes qui sont conçus pour
exploiter la psychologie humaine à cette fin.</p>
@@ -69,7 +69,7 @@
href="/proprietary/proprietary-addictions.html">programmes addictifs</a>,
qui exploitent également la psychologie humaine, mais de manière beaucoup
plus élaborée et dangereuse.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -187,7 +187,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-manipulation.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.ru.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-manipulation.ru.html 24 Jun 2020 05:04:04
-0000 1.6
+++ proprietary/proprietary-manipulation.ru.html 10 Nov 2020 17:37:39
-0000 1.7
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐанипÑлÑÑÐ¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми — одна
из ÑÑиÑ
вÑедоноÑнÑÑ
ÑÑнкÑий. ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð¿ÑогÑамм,
ÑпÑоекÑиÑованнÑÑ
, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ»Ð°ÑÑ ÑÑо,
опиÑаÑÑÑ
на ÑеловеÑеÑкÑÑ Ð¿ÑиÑ
ологиÑ.</p>
@@ -69,7 +69,7 @@
href="/proprietary/proprietary-addictions.html">пÑогÑамм,
вÑзÑваÑÑиÑ
завиÑимоÑÑÑ</a>, коÑоÑÑе Ñакже опиÑаÑÑÑÑ Ð½Ð°
ÑеловеÑеÑкÑÑ Ð¿ÑиÑ
ологиÑ, но
более изоÑÑеннÑм и опаÑнÑм обÑазом.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -191,7 +191,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-obsolescence.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.es.html 24 Jun 2020 05:02:25
-0000 1.8
+++ proprietary/proprietary-obsolescence.es.html 10 Nov 2020 17:37:39
-0000 1.9
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>La obsolescencia programada es una de las funcionalidades maliciosas que
pueden diseñarse en el software privativo.</p>
@@ -73,7 +73,7 @@
<p>Aquà se presentan ejemplos de programas privativos que hacen que los
dispositivos informáticos queden obsoletos de forma prematura.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -237,7 +237,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:25 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-obsolescence.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.fr.html 5 Oct 2020 13:13:25
-0000 1.8
+++ proprietary/proprietary-obsolescence.fr.html 10 Nov 2020 17:37:39
-0000 1.9
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>L'obsolescence programmée est l'une des fonctionnalités malveillantes qui
peuvent être intégrées au logiciel privateur.</p>
@@ -73,7 +73,7 @@
<p>Voici des exemples de logiciels privateurs qui rendent des appareils
prématurément obsolètes.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -237,7 +237,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-obsolescence.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-obsolescence.ru.html 24 Jun 2020 05:04:04
-0000 1.8
+++ proprietary/proprietary-obsolescence.ru.html 10 Nov 2020 17:37:39
-0000 1.9
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐапÑогÑаммиÑованное
ÑÑÑаÑевание —одна из вÑедоноÑнÑÑ
ÑÑнкÑий,
коÑоÑÑе могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð² неÑвободнÑе
пÑогÑаммÑ.</p>
@@ -73,7 +73,7 @@
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
коÑоÑÑе пÑиводÑÑ Ðº пÑеждевÑеменномÑ
ÑÑÑаÑÐµÐ²Ð°Ð½Ð¸Ñ Ð°Ð¿Ð¿Ð°ÑаÑÑÑÑ.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -234,7 +234,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-sabotage.es.html 8 Nov 2020 10:29:08 -0000
1.21
+++ proprietary/proprietary-sabotage.es.html 10 Nov 2020 17:37:39 -0000
1.22
@@ -60,12 +60,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Algunas funcionalidades maliciosas facilitan el sabotaje, esto es, la
abusiva intromisión del desarrollador en la utilización del software, con
graves consecuencias para los usuarios. Más abajo presentamos una lista de
tales situaciones.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -727,7 +727,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/proprietary-sabotage.fr.html 7 Nov 2020 13:01:45 -0000
1.101
+++ proprietary/proprietary-sabotage.fr.html 10 Nov 2020 17:37:39 -0000
1.102
@@ -59,12 +59,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Certaines fonctionnalités malveillantes ont pour effet le sabotage. Il
s'agit d'une ingérence grave du développeur dans l'utilisation du logiciel,
avec des conséquences néfastes pour les utilisateurs. Des exemples de telles
situations sont rapportées ci-dessous.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -728,7 +728,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/11/07 13:01:45 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/proprietary-sabotage.ru.html 7 Nov 2020 11:30:44 -0000
1.90
+++ proprietary/proprietary-sabotage.ru.html 10 Nov 2020 17:37:39 -0000
1.91
@@ -60,12 +60,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐекоÑоÑÑе вÑедоноÑнÑе ÑÑнкÑии ÑлÑжаÑ
пÑоводником ÑабоÑажÑ,
Ñ.е. злоÑпоÑÑÐµÐ±Ð»ÐµÐ½Ð¸Ñ Ð²Ð¼ÐµÑаÑелÑÑÑвом Ñо
ÑÑоÑÐ¾Ð½Ñ ÑазÑабоÑÑика в полÑзование
пÑогÑаммами, Ñ Ð²ÑеднÑми поÑледÑÑвиÑми длÑ
полÑзоваÑелей. ÐÑимеÑÑ Ð¿Ð¾Ð´Ð¾Ð±Ð½ÑÑ
ÑиÑÑаÑий пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -726,7 +726,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.es.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-subscriptions.es.html 18 Oct 2020 09:59:19
-0000 1.10
+++ proprietary/proprietary-subscriptions.es.html 10 Nov 2020 17:37:39
-0000 1.11
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Que un programa «requiera suscripción» parece algo simple. En concreto,
lo
que eso significa es que el programa contiene una bomba de relojerÃa, de
modo que dejará de funcionar a partir de una fecha determinada. O bien que
@@ -70,7 +70,7 @@
<p>Aquà se presentan ejemplos de suscripciones de software que causan un daño
directo a los usuarios.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -238,7 +238,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/18 09:59:19 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/proprietary-subscriptions.fr.html 17 Oct 2020 08:59:36
-0000 1.34
+++ proprietary/proprietary-subscriptions.fr.html 10 Nov 2020 17:37:39
-0000 1.35
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Cela paraît simple de dire qu'un certain programme « nécessite un
abonnement ». En pratique, cela signifie qu'il contient une bombe Ã
retardement et refusera de fonctionner après telle date, ou bien qu'il est
@@ -69,7 +69,7 @@
<p>Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui
ont
fait du tort directement aux utilisateurs.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -233,7 +233,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-subscriptions.ru.html 19 Oct 2020 10:00:04
-0000 1.32
+++ proprietary/proprietary-subscriptions.ru.html 10 Nov 2020 17:37:39
-0000 1.33
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðегко ÑказаÑÑ, ÑÑо опÑеделеннаÑ
пÑогÑамма “ÑÑебÑÐµÑ Ð¿Ð¾Ð´Ð¿Ð¸Ñки”. Ð
конкÑеÑно-Ñо ÑÑо знаÑиÑ, ÑÑо она ÑодеÑжиÑ
Ð¼Ð¸Ð½Ñ Ð·Ð°Ð¼ÐµÐ´Ð»ÐµÐ½Ð½Ð¾Ð³Ð¾ дейÑÑÐ²Ð¸Ñ Ð¸
оÑказÑваеÑÑÑ ÑабоÑаÑÑ Ð¿Ð¾Ñле
опÑеделенного моменÑа. Ðли она <a
@@ -70,7 +70,7 @@
<p>Ðиже пÑиводÑÑÑÑ Ð¿ÑимеÑÑ Ð¿Ð¾Ð´Ð¿Ð¸Ñки на
пÑогÑаммÑ, коÑоÑÑе нанеÑли полÑзоваÑелÑм
непоÑÑедÑÑвеннÑй вÑед.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -236,7 +236,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/proprietary-surveillance.es.html 3 Nov 2020 12:00:42
-0000 1.28
+++ proprietary/proprietary-surveillance.es.html 10 Nov 2020 17:37:39
-0000 1.29
@@ -86,7 +86,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Una funcionalidad maliciosa muy común es la que permite espiar al
usuario. En esta página se presentan ejemplos de <strong>casos claramente
establecidos de software privativo que espÃa o rastrea al
@@ -99,7 +99,7 @@
propia página: <a
href="/proprietary/proprietary-tethers.html#about-page">Subordinación a un
servidor en el software privativo</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -2899,7 +2899,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/03 12:00:42 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/proprietary-surveillance.fr.html 2 Nov 2020 18:03:07
-0000 1.240
+++ proprietary/proprietary-surveillance.fr.html 10 Nov 2020 17:37:39
-0000 1.241
@@ -84,7 +84,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Une fonctionnalité malveillante très courante est l'espionnage des
utilisateurs. Cette page rappporte des <strong>cas clairement établis de
logiciels privateurs espionnant l'utilisateur ou le suivant à la
@@ -97,7 +97,7 @@
ont une page dédiée : <a
href="/proprietary/proprietary-tethers.html#about-page">Dépendance
privatrice d'un serveur</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -2903,7 +2903,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary/proprietary-surveillance.ru.html 2 Nov 2020 18:03:07
-0000 1.251
+++ proprietary/proprietary-surveillance.ru.html 10 Nov 2020 17:37:39
-0000 1.252
@@ -85,7 +85,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Ðдна из обÑÑнÑÑ
ÑоÑм
неÑпÑаведливоÑÑей — подглÑдÑвание за
полÑзоваÑелÑми. Ðа ÑÑой ÑÑÑаниÑе запиÑанÑ
<strong>доÑÑовеÑно ÑÑÑановленнÑе
ÑлÑÑаи неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе
ÑпионÑÑ Ð·Ð° полÑзоваÑелÑми или
@@ -98,7 +98,7 @@
ниÑ
еÑÑÑ ÑÐ²Ð¾Ñ ÑÑÑаниÑа: <a
href="/proprietary/proprietary-tethers.html#about-page">ÐÑивÑзка в
неÑвободнÑÑ
пÑогÑаммаÑ
</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -2881,7 +2881,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/11/02 18:03:07 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-tethers.es.html 19 Oct 2020 09:00:51 -0000
1.11
+++ proprietary/proprietary-tethers.es.html 10 Nov 2020 17:37:39 -0000
1.12
@@ -61,7 +61,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Subordinar un producto o programa a un servidor significa diseñarlo de tal
modo que funcione únicamente comunicándose con un servidor especÃfico. Esto
es siempre una injusticia, pues significa que no se puede utilizar el
@@ -71,7 +71,7 @@
<p>En algunos casos, la subordinación a un servidor se utiliza cometer abusos
con los usuarios. En esta página se presentan ejemplos en los que tal
subordinación se ha usado directamente para dañar a los usuarios.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
@@ -376,7 +376,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/10/19 09:00:51 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/proprietary-tethers.fr.html 17 Oct 2020 08:59:36 -0000
1.48
+++ proprietary/proprietary-tethers.fr.html 10 Nov 2020 17:37:39 -0000
1.49
@@ -59,7 +59,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>L'« ancrage » d'un produit ou d'un programme à un serveur signifie que
ce
produit ou ce programme été conçu pour fonctionner exclusivement avec un
serveur particulier. C'est toujours une injustice parce que cela veut dire
@@ -70,7 +70,7 @@
<p>Dans certains cas, l'ancrage est utilisé pour faire des vilenies
particulières aux utilisateurs. Nous signalons ici des cas où ils en ont
pâti directement.</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -374,7 +374,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/proprietary-tethers.ru.html 19 Oct 2020 10:00:04 -0000
1.41
+++ proprietary/proprietary-tethers.ru.html 10 Nov 2020 17:37:39 -0000
1.42
@@ -60,7 +60,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>ÐÑивÑзка пÑодÑкÑа или пÑогÑаммÑ
ознаÑаеÑ, ÑÑо иÑ
пÑоекÑиÑÑÑÑ Ñак, ÑÑÐ¾Ð±Ñ Ð¾Ð½Ð¸
ÑабоÑали, ÑолÑко ÑвÑзÑваÑÑÑ Ñ
опÑеделеннÑм ÑеÑвеÑом. ÐÑо вÑегда
неÑпÑаведливо, поÑÐ¾Ð¼Ñ ÑÑо ÑÑо знаÑиÑ, ÑÑо
Ð²Ñ Ð½Ðµ можеÑе полÑзоваÑÑÑÑ
@@ -70,7 +70,7 @@
<p>РнекоÑоÑÑÑ
ÑлÑÑаÑÑ
пÑивÑзка
пÑименÑеÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´ÑÑÑаиваÑÑ ÐºÐ¾Ð½ÐºÑеÑнÑе
пакоÑÑи полÑзоваÑелÑм. Ðа ÑÑой ÑÑÑаниÑе
пÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ Ð¿ÑимеÑÑ, когда пÑивÑзка
пÑименÑлаÑÑ, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð¿ÑÑмÑÑ Ð²ÑедиÑÑ
полÑзоваÑелÑм.</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -375,7 +375,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/10/19 10:00:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.es.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/proprietary-tyrants.es.html 24 Jun 2020 05:02:26 -0000
1.30
+++ proprietary/proprietary-tyrants.es.html 10 Nov 2020 17:37:39 -0000
1.31
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Un dispositivo <em>tirano</em> es un dispositivo malicioso que no permite a
los usuarios instalar un sistema operativo diferente o modificado. Estos
dispositivos cuentan con medidas para bloquear la ejecución de cualquier
otro, excepto las versiones de los sistemas «aprobados». También nos
referimos a esta práctica como «<i>tivoización</i>».
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si conoce algún ejemplo más que deba estar incluido en esta página,
escriba
@@ -219,7 +219,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/06/24 05:02:26 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/proprietary-tyrants.fr.html 5 Oct 2020 13:13:25 -0000
1.32
+++ proprietary/proprietary-tyrants.fr.html 10 Nov 2020 17:37:39 -0000
1.33
@@ -59,14 +59,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Un appareil <em>tyran</em> a comme particularité de refuser aux
utilisateurs
le droit d'installer un système d'exploitation différent ou modifié. Ces
appareils ont des dispositifs destinés à bloquer l'exécution de systèmes
autres que ceux dont les versions sont « approuvées ». Nous faisons aussi
référence à cette pratique sous le nom de <em>tivoïsation</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -217,7 +217,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2020/10/05 13:13:25 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.pt-br.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-tyrants.pt-br.html 24 Jun 2020 05:02:41 -0000
1.6
+++ proprietary/proprietary-tyrants.pt-br.html 10 Nov 2020 17:37:39 -0000
1.7
@@ -59,14 +59,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Um <em>tirano</em> é um dispositivo malicioso que se recusa a permitir que
os usuários instalem um sistema operacional diferente ou um sistema
operacional modificado. Esses dispositivos têm medidas para bloquear a
execução de qualquer coisa que não seja uma versão de sistema
âaprovadaâ. Também nos referimos a essa prática como
<em>tivoização</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
@@ -218,7 +218,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/06/24 05:02:41 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/proprietary-tyrants.ru.html 24 Jun 2020 05:04:04 -0000
1.33
+++ proprietary/proprietary-tyrants.ru.html 10 Nov 2020 17:37:39 -0000
1.34
@@ -60,14 +60,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p><em>ТиÑан</em> — ÑÑо вÑедоноÑное
ÑÑÑÑойÑÑво, коÑоÑое не позволÑеÑ
полÑзоваÑелÑм ÑÑÑанавливаÑÑ Ð´ÑÑгÑÑ Ð¸Ð»Ð¸
измененнÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ ÑиÑÑемÑ. Ð
ÑÑиÑ
ÑÑÑÑойÑÑваÑ
еÑÑÑ ÑÑедÑÑва, ÑÑобÑ
блокиÑоваÑÑ Ð¸Ñполнение вÑего, кÑоме
“одобÑеннÑÑ
” веÑÑий ÑиÑÑемÑ. ÐÑ
Ñакже назÑваем ÑÑÑ Ð¿ÑакÑикÑ
<em>ÑивоизаÑией</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
@@ -219,7 +219,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2020/06/24 05:04:04 $
+$Date: 2020/11/10 17:37:39 $
<!-- timestamp end -->
</p>
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/de.po 10 Nov 2020 16:01:57 -0000 1.230
+++ proprietary/po/de.po 10 Nov 2020 17:37:39 -0000 1.231
@@ -5290,7 +5290,7 @@
msgid "Malware in Games"
msgstr "Schadsoftware in Spielen"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7936,7 +7936,7 @@
msgid "Malware in Mobile Devices"
msgstr "Schadprogramme auf Mobilgeräten"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -7948,7 +7948,7 @@
"are-stalin-s-dream-says-free-software-movement-founder.html\">Stalin's "
"dream</q>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -10000,7 +10000,7 @@
msgid "Malware in Webpages"
msgstr "Schadsoftware in Internetpräsenzen"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -10303,7 +10303,7 @@
msgid "Potential Malware"
msgstr "Potenzielle Schadsoftware"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -10449,7 +10449,7 @@
msgid "Proprietary Addictions"
msgstr "Proprietäres Blendwerk"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -10702,7 +10702,7 @@
msgid "Proprietary Back Doors"
msgstr "Proprietäre Hintertüren"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | {+Some malicious functionalities are mediated by <a
# | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+} Here are
# | examples of [-demonstrated back doors in proprietary software. They are
@@ -11082,7 +11082,7 @@
msgid "Proprietary Censorship"
msgstr "Proprietäre Zensur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
# | can access. {+Here are examples of programs which do this.+} We have a
@@ -11111,7 +11111,7 @@
"Installation von Anwenderprogrammen zensieren (wir nennen sie "
"<em>Gefängnisse</em>)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -11169,7 +11169,7 @@
msgid "Proprietary Coverups"
msgstr "Proprietäre Vertuschungen"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -11201,7 +11201,7 @@
msgid "Proprietary Deception"
msgstr "Proprietäres Blendwerk"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -11290,7 +11290,7 @@
msgid "Proprietary DRM"
msgstr "Proprietäre Digitale Rechte-Minderung (DRM)"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -11303,7 +11303,7 @@
"Nutzer tun können. Diese Funktionalitäten werden auch <em>digitale "
"Handschellen</em> genannt."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -11446,7 +11446,7 @@
msgid "Proprietary Fraud"
msgstr "Proprietäre Tyrannen"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Here are {+some+} examples of proprietary software that [-has something
# | worse than a back door.-] {+defrauds users—taking their money by
# | trickery.+}
@@ -11484,13 +11484,13 @@
msgid "Proprietary Incompatibility"
msgstr "Inkompatibilität"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-In this section, we list characteristics-]{+A fairly common sort+} of
# | [-Apple programs that block-] {+incompatibility is the use of secret
# | formats or protocols. This directly blocks+} or hinder{+s+} users from
@@ -11514,7 +11514,7 @@
"‑ und insbesondere vom Wechsel auf Freie Software, die das Gerät,
"
"auf dem die Software ausgeführt wird, befreien kann."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -11522,7 +11522,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -11530,7 +11530,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -11554,7 +11554,7 @@
msgid "Proprietary Insecurity"
msgstr "Proprietäre Unsicherheit"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -11563,7 +11563,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -11760,7 +11760,7 @@
msgid "Proprietary Interference"
msgstr "Proprietäre Interferenz"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | {+One kind of malicious functionality mediates developer's interference
# | into the use of the software.+} This page describes how various
# | proprietary programs [-mess up-] {+harass or annoy the user, or cause
@@ -11841,7 +11841,7 @@
msgid "Proprietary Jails"
msgstr "Proprietäre Gefängnisse"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here-]{+The “jails”+} are [-examples of proprietary-]
# | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
# | designed to impose censorship of which applications the user can install.
@@ -11865,7 +11865,7 @@
"ZRViDum.jpg\">Bild eines iGefängnisses</a> , <cite><q>Your device is your "
"prison. Go outside.</q></cite>, illustriert dies."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -11876,7 +11876,7 @@
"Unternehmen zu verkaufen, um Zensur zu verhängen, sollte per Gesetz verboten
"
"sein ‑ ist es aber nicht."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -11936,14 +11936,14 @@
msgid "Proprietary Manipulation"
msgstr "Proprietäres Blendwerk"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -11965,7 +11965,7 @@
msgid "Proprietary Obsolescence"
msgstr "Proprietäres Blendwerk"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are some examples-]{+Programmed obsolescence is one+} of
# | [-demonstrated-] {+the+} malicious functionalities [-in Microsoft's-]
# | {+that may be designed into+} proprietary software.
@@ -11980,7 +11980,7 @@
"Hier einige Beispiele von nachgewiesenen schädlichen Funktionen in "
"Microsofts proprietärer Software."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -11988,7 +11988,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Here are examples of proprietary [-software-] {+programs+} that [-has
# | documented back doors.-] {+make hardware devices prematurely obsolete.+}
#, fuzzy
@@ -12538,7 +12538,7 @@
msgid "Proprietary Sabotage"
msgstr "Proprietäre Sabotage"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -12723,7 +12723,7 @@
msgid "Proprietary Subscriptions"
msgstr "Proprietäre Abonnements"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | It sounds simple to say that a certain program “requires a
# | subscription.” What that means concretely is that it contains a time
# | bomb, so that it will refuse to operate after that date. Or else it is <a
@@ -12753,7 +12753,7 @@
"href=\"/proprietary/proprietary-tethers\">an einen Server gebunden</a> und "
"dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -12781,7 +12781,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "âWoher wussten sie, dass ich ein Hund bin?â"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -12790,7 +12790,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -13824,7 +13824,7 @@
msgid "Proprietary Tethers"
msgstr "Proprietäre Haltestricke"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -13832,7 +13832,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Tethering a product or program-]{+In some cases, tethering is used+} to
# | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
# | to the users.+} This page reports instances where tethering was used to
@@ -13860,7 +13860,7 @@
msgstr "Proprietäre Tyrannen"
# 'tyrant' als 'tyrannical' übersetzt -> liest sich flüssiger
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
# | refuses to allow users to install a different operating system or a
# | modified operating system. These devices have measures to block execution
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary/po/es.po 10 Nov 2020 16:01:57 -0000 1.328
+++ proprietary/po/es.po 10 Nov 2020 17:37:39 -0000 1.329
@@ -4865,7 +4865,7 @@
msgid "Malware in Games"
msgstr "<cite>Malware</cite> en el Echo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7659,7 +7659,7 @@
msgid "Malware in Mobile Devices"
msgstr "<cite>Malware</cite> en los dispositivos móviles"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -7669,7 +7669,7 @@
"rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los "
"llamamos «el sueño de Stalin»."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -9826,7 +9826,7 @@
msgid "Malware in Webpages"
msgstr "<cite>Malware</cite> en otros productos"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -10120,7 +10120,7 @@
msgid "Potential Malware"
msgstr "<cite>:Malware</cite> potencial"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -10281,7 +10281,7 @@
msgid "Proprietary Addictions"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -10759,7 +10759,7 @@
msgid "Proprietary Back Doors"
msgstr "Los sistemas privativos son prisiones"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Some malicious functionalities are mediated by <a
# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
# | examples of programs that contain one or several of those, [-sorted out-]
@@ -11149,7 +11149,7 @@
msgid "Proprietary Censorship"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
# | can access. {+Here are examples of programs which do this.+} We have a
@@ -11177,7 +11177,7 @@
"privativos que censuran la instalación</a> de programas de aplicación (los "
"llamamos «prisiones»)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -11239,7 +11239,7 @@
msgid "Proprietary Coverups"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -11278,7 +11278,7 @@
msgid "Proprietary Deception"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -11395,7 +11395,7 @@
msgid "Proprietary DRM"
msgstr "Los sistemas privativos son prisiones"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -11408,7 +11408,7 @@
"diseñadas para restringir lo que los usuarios pueden hacer. Estas "
"funcionalidades también se conocen como <em>esposas digitales</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -11542,7 +11542,7 @@
msgid "Proprietary Fraud"
msgstr "Los sistemas privativos son tiranos"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Here are {+some+} examples of proprietary software that [-has something
# | worse than a back door.-] {+defrauds users—taking their money by
# | trickery.+}
@@ -11586,7 +11586,7 @@
msgid "Proprietary Incompatibility"
msgstr "Incompatibilidad de Apple"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -11594,7 +11594,7 @@
"Una de estas funcionalidades maliciosas es la intencionada incompatibilidad "
"de un programa con software de terceros que opera con el mismo tipo de datos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-The “incompatibility” category includes-]{+A fairly common
# | sort of incompatibility is+} the use of secret formats or [-protocols in
# | proprietary software.-] {+protocols.+} This directly blocks or hinders
@@ -11620,7 +11620,7 @@
"software libre que pudiera liberar el dispositivo en el que se ejecuta ese "
"software."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -11632,7 +11632,7 @@
"datos antiguos se volverá muy complicado si se deja de mantener el software "
"privativo que puede leerlos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -11644,7 +11644,7 @@
"sistema sea tan engorrosa o lenta que resulte impracticable, a menos que se "
"trate de una pequeña cantidad de datos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -11678,7 +11678,7 @@
msgid "Proprietary Insecurity"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -11693,7 +11693,7 @@
"aquà para mostrar que el software privativo no es inmune a los fallos, y a "
"menudo es bastante chapucero."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
@@ -11853,7 +11853,7 @@
msgid "Proprietary Interference"
msgstr "Interferencia de Apple"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | One kind of malicious functionality mediates developer's interference into
# | the use of the software. This page describes how various proprietary
# | programs harass or annoy the user, or cause trouble for the user. These
@@ -11942,7 +11942,7 @@
msgid "Proprietary Jails"
msgstr "Los sistemas privativos son prisiones"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here-]{+The “jails”+} are [-examples of proprietary-]
# | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
# | designed to impose censorship of which applications the user can install.
@@ -11966,7 +11966,7 @@
"href=\"http://i.imgur.com/ZRViDum.jpg\">imagen de una iPrisión</a> ilustra "
"el problema."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -11977,7 +11977,7 @@
"para que una empresa imponga la censura deberÃa estar prohibida por la ley, "
"pero no lo está."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -12041,7 +12041,7 @@
msgid "Proprietary Manipulation"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -12051,7 +12051,7 @@
"Aquà se presentan ejemplos de programas que se han diseñado para hacerlo "
"aprovechando caracterÃsticas de la psicologÃa humana."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -12079,7 +12079,7 @@
msgid "Proprietary Obsolescence"
msgstr "Censura en el software privativo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
# | that may be designed into proprietary [-software is obsolescence.-]
# | {+software.+}
@@ -12094,7 +12094,7 @@
"Una de las funcionalidades maliciosas que pueden diseñarse en el software "
"privativo es la obsolescencia."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -12107,7 +12107,7 @@
"tiempo, al dejar de recibir mantenimiento, o bien a desechar equipos que "
"podrÃan haberse reparado."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -12555,7 +12555,7 @@
msgid "Proprietary Sabotage"
msgstr "Los sistemas privativos son tiranos"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -12734,7 +12734,7 @@
msgid "Proprietary Subscriptions"
msgstr "Suscripciones de Microsoft"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | It sounds simple to say that a certain program “requires a
# | subscription.” What that means concretely is that it contains a time
# | bomb, so that it will refuse to operate after that date. Or else it is <a
@@ -12764,7 +12764,7 @@
"<a href=\"/proprietary/proprietary-tethers.html\">depende de un servidor</a> "
"que comprueba la fecha. Ambas son funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -12804,7 +12804,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "«¿Cómo habrán descubierto que soy un perro?»"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-One-]{+A+} common [-form of mistreatment-] {+malicious functionality+}
# | is to snoop on the user. This page records <strong>clearly established
# | cases of proprietary software that spies on or tracks users</strong>.
@@ -12832,7 +12832,7 @@
"hoard-data-government-demands/\">decir si espÃan a los usuarios por cuenta "
"del Estado</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | All appliances and applications that are tethered to a specific server are
# | snoopers by nature. We do not list them [-in this page-] {+here+} because
# | they have their own page: <a
@@ -13871,7 +13871,7 @@
msgid "Proprietary Tethers"
msgstr "Los sistemas privativos son tiranos"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -13884,7 +13884,7 @@
"programa sin ese servidor. Se produce también una injusticia secundaria si "
"no es posible comunicarse con el servidor de otra manera."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Tethering a product or program-]{+In some cases, tethering is used+} to
# | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
# | to the users.+} This page reports instances where tethering was used to
@@ -13912,7 +13912,7 @@
msgid "Proprietary Tyrants"
msgstr "Los sistemas privativos son tiranos"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
# | refuses to allow users to install a different operating system or a
# | modified operating system. These devices have measures to block execution
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- proprietary/po/fr.po 10 Nov 2020 16:01:58 -0000 1.404
+++ proprietary/po/fr.po 10 Nov 2020 17:37:39 -0000 1.405
@@ -4337,7 +4337,7 @@
msgid "Malware in Games"
msgstr "Malveillance des jeux"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -6646,7 +6646,7 @@
msgid "Malware in Mobile Devices"
msgstr "Malveillance des mobiles"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -6656,7 +6656,7 @@
"de deux manières : ils suivent leurs mouvements et ils écoutent leurs "
"conversations. C'est pourquoi nous les appelons « le rêve de Staline »."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -8586,7 +8586,7 @@
msgid "Malware in Webpages"
msgstr "Malveillance des pages web"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -8844,7 +8844,7 @@
msgid "Potential Malware"
msgstr "Malveillance potentielle"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -8999,7 +8999,7 @@
msgid "Proprietary Addictions"
msgstr "Pratiques addictives du privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -9356,7 +9356,7 @@
msgid "Proprietary Back Doors"
msgstr "Portes dérobées du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -9689,7 +9689,7 @@
msgid "Proprietary Censorship"
msgstr "Censure par le logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -9703,7 +9703,7 @@
"\">liste distincte des systèmes privateurs qui censurent l'installation</a> "
"d'applications (on les appelle les “prisons”.)"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -9759,7 +9759,7 @@
msgid "Proprietary Coverups"
msgstr "Dissimulation privatrice"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -9791,7 +9791,7 @@
msgid "Proprietary Deception"
msgstr "Pratiques trompeuses du privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -9884,7 +9884,7 @@
msgid "Proprietary DRM"
msgstr "DRM du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -9897,7 +9897,7 @@
"conçues dans l'intention de restreindre ce que les utilisateurs peuvent "
"faire. Ces fonctionnalités sont aussi appelées <em>menottes
numériques</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -10014,7 +10014,7 @@
msgid "Proprietary Fraud"
msgstr "Escroqueries du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -10043,7 +10043,7 @@
msgid "Proprietary Incompatibility"
msgstr "Incompatibilité du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -10051,7 +10051,7 @@
"L'une de ces fonctionnalités malveillantes est l'incompatibilité
délibérée "
"d'un programme avec d'autres logiciels qui utilisent le même type de
données."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -10064,7 +10064,7 @@
"programme libre, qui permettrait de libérer l'appareil sur lequel tourne le "
"logiciel."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -10076,7 +10076,7 @@
"récupération de données anciennes sera très difficile si le logiciel "
"privateur qui peut les lire n'est plus pris en charge."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -10088,7 +10088,7 @@
"système, si compliquée ou si lente qu'elle n'est pas faisable pour une "
"quantité significative de données."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10115,7 +10115,7 @@
msgid "Proprietary Insecurity"
msgstr "Insécurité du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10131,7 +10131,7 @@
"logiciel privateur n'est pas exempt de bogues et qu'il est souvent tout à "
"fait bâclé."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10284,7 +10284,7 @@
msgid "Proprietary Interference"
msgstr "Ingérence privatrice"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -10357,7 +10357,7 @@
msgid "Proprietary Jails"
msgstr "Prisons du logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -10369,7 +10369,7 @@
"\"http://i.imgur.com/ZRViDum.jpg\">image de l'iPrison</a> illustre ce "
"problème."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -10380,7 +10380,7 @@
"servant à une société pour imposer la censure devrait être interdit par
la "
"loi, mais ce n'est pas le cas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -10426,7 +10426,7 @@
msgid "Proprietary Manipulation"
msgstr "Pratiques manipulatrices du privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -10436,7 +10436,7 @@
"malveillantes. Voici des exemples de programmes qui sont conçus pour "
"exploiter la psychologie humaine à cette fin."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -10456,7 +10456,7 @@
msgid "Proprietary Obsolescence"
msgstr "Obsolescence causée par le logiciel privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
@@ -10464,7 +10464,7 @@
"L'obsolescence programmée est l'une des fonctionnalités malveillantes qui "
"peuvent être intégrées au logiciel privateur."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -10478,7 +10478,7 @@
"fabricant, ou à jeter des composant défectueux qui auraient pu être faits "
"pour être réparables."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -10873,7 +10873,7 @@
msgid "Proprietary Sabotage"
msgstr "Sabotage privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -11039,7 +11039,7 @@
msgid "Proprietary Subscriptions"
msgstr "Abonnements privateurs"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -11055,7 +11055,7 @@
"serveur</a> et que ce serveur vérifie la date. L'une et l'autre sont des "
"fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -11087,7 +11087,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "« Comment ont-ils découvert que je suis un chien ? »"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -11102,7 +11102,7 @@
"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
"\">dire s'ils espionnent l'utilisateur au profit de l'Ãtat</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -12018,7 +12018,7 @@
msgid "Proprietary Tethers"
msgstr "Ancrage privateur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -12032,7 +12032,7 @@
"également une injustice secondaire si on ne peut pas communiquer avec le "
"serveur d'une autre manière."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -12050,7 +12050,7 @@
msgid "Proprietary Tyrants"
msgstr "Tyrans privateurs"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/it.po 10 Nov 2020 16:01:59 -0000 1.230
+++ proprietary/po/it.po 10 Nov 2020 17:37:39 -0000 1.231
@@ -4918,7 +4918,7 @@
msgid "Malware in Games"
msgstr "Spyware in giochi"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -7393,14 +7393,14 @@
msgid "Malware in Mobile Devices"
msgstr "Malware nei dispositivi mobili"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -9309,7 +9309,7 @@
msgid "Malware in Webpages"
msgstr "Malware in Echo"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -9579,7 +9579,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -9689,7 +9689,7 @@
msgid "Proprietary Addictions"
msgstr "DRM Proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -9942,7 +9942,7 @@
msgid "Proprietary Back Doors"
msgstr "Backdoor proprietarie"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -10311,7 +10311,7 @@
msgid "Proprietary Censorship"
msgstr "Censura Proprietaria"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
# | can access. {+Here are examples of programs which do this.+} We have a
@@ -10339,7 +10339,7 @@
"proprietari che censurano l'installazione</a> di programmi (che chiamiamo "
"“prigioni”)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -10408,7 +10408,7 @@
msgid "Proprietary Coverups"
msgstr "Censura Proprietaria"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -10437,7 +10437,7 @@
msgid "Proprietary Deception"
msgstr "DRM Proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -10497,7 +10497,7 @@
msgid "Proprietary DRM"
msgstr "DRM Proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -10510,7 +10510,7 @@
"gli utenti. Queste funzionalità vengono anche chiamate <em>manette
digitali</"
"em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -10632,7 +10632,7 @@
msgid "Proprietary Fraud"
msgstr "Tiranni Proprietari"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Here are {+some+} examples of proprietary software that [-has something
# | worse than a back door.-] {+defrauds users—taking their money by
# | trickery.+}
@@ -10671,13 +10671,13 @@
msgid "Proprietary Incompatibility"
msgstr "Mancata sicurezza di Apple"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -10685,7 +10685,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -10693,7 +10693,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -10701,7 +10701,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10726,7 +10726,7 @@
msgid "Proprietary Insecurity"
msgstr "Scarsa sicurezza proprietaria"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10735,7 +10735,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10914,7 +10914,7 @@
msgid "Proprietary Interference"
msgstr "Interferenza di Apple"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Various-]{+One kind of malicious functionality mediates developer's
# | interference into the use of the software. This page describes how
# | various+} proprietary programs [-often mess up-] {+harass or annoy the
@@ -10983,7 +10983,7 @@
msgid "Proprietary Jails"
msgstr "Prigioni proprietarie"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here-]{+The “jails”+} are [-examples of proprietary-]
# | {+malicious operating+} systems that are [-<em>jails</em>: they do not
# | allow-] {+designed to impose censorship of which applications+} the user
@@ -11006,7 +11006,7 @@
"\"http://i.imgur.com/ZRViDum.jpg\">immagine dell'iPrigione</a> illustra "
"questo problema."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -11016,7 +11016,7 @@
"possiede il sistema. Vendere prodotti progettati come piattaforme tramite "
"cui le società possono censurare dovrebbe essere illegale, ma non lo è."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -11075,14 +11075,14 @@
msgid "Proprietary Manipulation"
msgstr "DRM Proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -11104,13 +11104,13 @@
msgid "Proprietary Obsolescence"
msgstr "DRM Proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -11118,7 +11118,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | Here are examples of proprietary [-software-] {+programs+} that [-has
# | something worse than a back door.-] {+make hardware devices prematurely
# | obsolete.+}
@@ -11664,7 +11664,7 @@
msgid "Proprietary Sabotage"
msgstr "Sabotaggio proprietario"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -11832,7 +11832,7 @@
msgid "Proprietary Subscriptions"
msgstr "Insicurezza di Microsoft"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -11842,7 +11842,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -11872,7 +11872,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "“Come fanno a sapere che sono un cane?”"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -11881,7 +11881,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -12934,7 +12934,7 @@
msgid "Proprietary Tethers"
msgstr "Tiranni Proprietari"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -12942,7 +12942,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -12957,7 +12957,7 @@
msgid "Proprietary Tyrants"
msgstr "Tiranni Proprietari"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
# | refuses to allow users to install a different operating system or a
# | modified operating system. These devices have measures to block execution
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/ja.po 10 Nov 2020 16:01:59 -0000 1.238
+++ proprietary/po/ja.po 10 Nov 2020 17:37:40 -0000 1.239
@@ -3773,7 +3773,7 @@
msgid "Malware in Games"
msgstr "ã²ã¼ã ã®ãã«ã¦ã§ã¢"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5748,14 +5748,14 @@
msgid "Malware in Mobile Devices"
msgstr "ã¢ãã¤ã«ã»ããã¤ã¹ã®ãã«ã¦ã§ã¢"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -7200,7 +7200,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -7409,7 +7409,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -7513,7 +7513,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -7765,7 +7765,7 @@
msgid "Proprietary Back Doors"
msgstr "ãããã©ã¤ã¨ã¿ãªãªããã¯ãã¢"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of demonstrated back doors in proprietary software."
@@ -8044,7 +8044,7 @@
msgid "Proprietary Censorship"
msgstr "ãããã©ã¤ã¨ã¿ãªãªæ¤é²"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary systems that impose censorship on what "
@@ -8064,7 +8064,7 @@
"proprietary-jails.html\">ã¤ã³ã¹ãã¬ã¼ã·ã§ã³ãæ¤é²ãããããã©ã¤ã¨ã¿ãªãªã·ã¹ã"
"ã
ã®ãªã¹ã</a>(ããããã¡ã¯ããããç¢çãã¨å¼ã³ã¾ã)ã¯å¥ã«ããã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -8117,7 +8117,7 @@
msgid "Proprietary Coverups"
msgstr "ãããã©ã¤ã¨ã¿ãªãªãã¿æ¶ã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -8148,7 +8148,7 @@
msgid "Proprietary Deception"
msgstr "ãããã©ã¤ã¨ã¿ãªã®æ¬ºã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -8222,7 +8222,7 @@
msgid "Proprietary DRM"
msgstr "ãããã©ã¤ã¨ã¿ãªãªDRM"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -8233,7 +8233,7 @@
"(DRM)ãå®è£
ãã¦ããä¾ã§ã:
ã¦ã¼ã¶ãã§ãããã¨ãæå³çã«å¶éããããã«è¨è¨ãã"
"ãæ©è½ã§ãããã®æ©è½ã¯ã<em>ãã£ã¸ã¿ã«æé
</em>ã¨ãå¼ã°ãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -8335,7 +8335,7 @@
msgid "Proprietary Fraud"
msgstr "ãããã©ã¤ã¨ã¿ãªãªæ´å"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary software that has something worse than a "
@@ -8363,13 +8363,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -8377,7 +8377,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -8385,7 +8385,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -8393,7 +8393,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -8418,7 +8418,7 @@
msgid "Proprietary Insecurity"
msgstr "ãããã©ã¤ã¨ã¿ãªã®å±éºæ§"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -8427,7 +8427,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -8545,7 +8545,7 @@
msgid "Proprietary Interference"
msgstr "ãããã©ã¤ã¨ã¿ãªãªå¹²æ¸"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "This page describes how various proprietary programs mess up the user's "
@@ -8610,7 +8610,7 @@
msgid "Proprietary Jails"
msgstr "ãããã©ã¤ã¨ã¿ãªãªç¢ç"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary systems that are <em>jails</em>: they do "
@@ -8626,7 +8626,7 @@
"ãªã±ã¼ã·ã§ã³ãã¤ã³ã¹ãã¼ã«ãããã¨ãèªãã¾ããã<a
href=\"http://i.imgur.com/"
"ZRViDum.jpg\">iPrisonã®ç»å</a>ããã®åé¡ãæãã¦ãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -8636,7 +8636,7 @@
"ããä¸ã¤ã®ä¼ç¤¾ã®ãã©ãããã©ã¼ã
ã¨ãã¦ãæ¤é²ãå¼·å¶ããããã«è¨è¨ããã製åã"
"販売ããã®ã¯æ³å¾ã§ç¦æ¢ãããã¹ãã§ããããããªã£ã¦ãã¾ããã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -8684,14 +8684,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -8712,13 +8712,13 @@
msgid "Proprietary Obsolescence"
msgstr "ãããã©ã¤ã¨ã¿ãªã®æ¬ºã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -8726,7 +8726,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary software that has something worse than a "
@@ -9124,7 +9124,7 @@
msgid "Proprietary Sabotage"
msgstr "ãããã©ã¤ã¨ã¿ãªãªå¦¨å®³è¡çº"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -9258,7 +9258,7 @@
msgid "Proprietary Subscriptions"
msgstr "ãããã©ã¤ã¨ã¿ãªãªè³¼èª"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "It sounds simple to say that a certain program “requires a "
@@ -9281,7 +9281,7 @@
"ãµã¼ãã¸ç¹ãæ¢ã</a>ããã¦ãã¦ããµã¼ããæ¥ä»ããã§ãã¯ãã¾ããã©ã¡ãã«ãã¦ã"
"æªæã®ããæ©è½ã§ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -9311,7 +9311,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "ãã©ããã£ã¦ãããããç¬ã ã¨ããã£ããã ãã?ã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -9320,7 +9320,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -10215,7 +10215,7 @@
msgid "Proprietary Tethers"
msgstr "ãããã©ã¤ã¨ã¿ãªãªç¹ãæ¢ã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -10223,7 +10223,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -10240,7 +10240,7 @@
msgid "Proprietary Tyrants"
msgstr "ãããã©ã¤ã¨ã¿ãªãªæ´å"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "A <em>tyrant</em> device is one that refuses to allow users to install a "
Index: proprietary/po/malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/malware-games.de-diff.html 2 Nov 2020 17:32:38 -0000
1.48
+++ proprietary/po/malware-games.de-diff.html 10 Nov 2020 17:37:40 -0000
1.49
@@ -76,14 +76,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Among the numerous malicious functionalities that are
found</em></ins></span> in <span
class="inserted"><ins><em>games,</em></ins></span>
<a
<span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">
whether</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html#addictiveness">
addictiveness</a> may be</em></ins></span> the <span
class="inserted"><ins><em>worst, because it doesn't only
affect</em></ins></span> users <span class="removed"><del><strong>have
control</strong></del></span>
<span class="inserted"><ins><em>materially, but also psychologically.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in this page but isn't
@@ -452,7 +452,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 17:32:38 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-games.de.po 2 Nov 2020 17:32:38 -0000 1.49
+++ proprietary/po/malware-games.de.po 10 Nov 2020 17:37:40 -0000 1.50
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-games.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-12-05 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-games.es-en.html 3 Nov 2020 12:00:44 -0000
1.11
+++ proprietary/po/malware-games.es-en.html 10 Nov 2020 17:37:40 -0000
1.12
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Among the numerous malicious functionalities that are found in games,
<a href="/proprietary/proprietary-addictions.html#addictiveness">
addictiveness</a> may be the worst, because it doesn't only affect users
materially, but also psychologically.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/03 12:00:44 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-games.es.po 3 Nov 2020 12:00:44 -0000 1.32
+++ proprietary/po/malware-games.es.po 10 Nov 2020 17:37:40 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-11-03 11:47+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -81,7 +81,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-games.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-games.fr-en.html 2 Nov 2020 18:03:09 -0000
1.45
+++ proprietary/po/malware-games.fr-en.html 10 Nov 2020 17:37:40 -0000
1.46
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Among the numerous malicious functionalities that are found in games,
<a href="/proprietary/proprietary-addictions.html#addictiveness">
addictiveness</a> may be the worst, because it doesn't only affect users
materially, but also psychologically.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/malware-games.fr.po 2 Nov 2020 17:49:26 -0000 1.89
+++ proprietary/po/malware-games.fr.po 10 Nov 2020 17:37:40 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-11-02 18:46+0100\n"
"Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-games.ja-diff.html 2 Nov 2020 17:32:38 -0000
1.57
+++ proprietary/po/malware-games.ja-diff.html 10 Nov 2020 17:37:40 -0000
1.58
@@ -76,14 +76,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Among the numerous malicious functionalities that are
found</em></ins></span> in <span
class="inserted"><ins><em>games,</em></ins></span>
<a
<span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">
whether</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html#addictiveness">
addictiveness</a> may be</em></ins></span> the <span
class="inserted"><ins><em>worst, because it doesn't only
affect</em></ins></span> users <span class="removed"><del><strong>have
control</strong></del></span>
<span class="inserted"><ins><em>materially, but also psychologically.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in this page but isn't
@@ -452,7 +452,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 17:32:38 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/malware-games.ja.po 2 Nov 2020 17:32:38 -0000 1.49
+++ proprietary/po/malware-games.ja.po 10 Nov 2020 17:37:40 -0000 1.50
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -99,7 +99,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/malware-games.pot 2 Nov 2020 17:32:38 -0000 1.42
+++ proprietary/po/malware-games.pot 10 Nov 2020 17:37:40 -0000 1.43
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-games.ru-en.html 2 Nov 2020 18:03:09 -0000
1.45
+++ proprietary/po/malware-games.ru-en.html 10 Nov 2020 17:37:40 -0000
1.46
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Among the numerous malicious functionalities that are found in games,
<a href="/proprietary/proprietary-addictions.html#addictiveness">
addictiveness</a> may be the worst, because it doesn't only affect users
materially, but also psychologically.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -400,7 +400,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/malware-games.ru.po 2 Nov 2020 18:03:09 -0000 1.96
+++ proprietary/po/malware-games.ru.po 10 Nov 2020 17:37:40 -0000 1.97
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/malware-mobiles.de-diff.html 17 Oct 2020 08:05:07 -0000
1.85
+++ proprietary/po/malware-mobiles.de-diff.html 10 Nov 2020 17:37:40 -0000
1.86
@@ -87,7 +87,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>Nearly all mobile phones do two grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
@@ -98,21 +98,21 @@
Google are listed in dedicated pages, <a
href="/proprietary/malware-apple.html">Apple's Operating Systems are
Malware</a> and <a href="/proprietary/malware-google.html">Google's
-Software Is Malware</a> respectively.</p></em></ins></span>
-</div>
+Software Is Malware</a> respectively.</p>
+</blockquote>
-<span class="removed"><del><strong><ul>
- <li><p>The</strong></del></span>
-
-<span class="inserted"><ins><em><div class="important">
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
+to serve as specific substantiation.</p></em></ins></span>
</div>
-<div class="column-limit" id="phone-communications"></div>
+<span class="removed"><del><strong><ul>
+ <li><p>The</strong></del></span>
+
+<span class="inserted"><ins><em><div class="column-limit"
id="phone-communications"></div>
<ul class="blurbs">
<li id="M201502100">
@@ -286,48 +286,49 @@
<p>Xiaomi phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because
of</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"></em></ins></span>
- a <span class="removed"><del><strong>bug</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> in
- <span class="removed"><del><strong>Broadcom's non-free
firmware.</p>
+ a <span class="removed"><del><strong>bug in
+ Broadcom's non-free firmware.</p>
</li>
<li>
<p>Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>the application
processor, for Xiaomi's
- use</a>.</p>
-
- <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
-a security hole</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
- universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message to install
-ransomware</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the local phone
- company can use</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Many</strong></del></span>
+phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+a security hole that allows an SMS message to install
+ransomware</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's</em></ins></span> proprietary <span
class="removed"><del><strong>payment apps <a
+<li>
+<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data in an insecure way</a>.
-However, the worse aspect of these apps is</strong></del></span> <span
class="inserted"><ins><em>Android library, Moplus, has a back
door</em></ins></span> that <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+transmit personal data</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> in <span
class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
+ use</a>.</p>
+
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>separate from</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
</p>
</li>
<li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
- can <span class="removed"><del><strong>tap data in smart phones, including
iPhones, Android, and
- BlackBerry</a>. While there</strong></del></span> <span
class="inserted"><ins><em>“upload files” as well as forcibly install
+ The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>the modem
processor</em></ins></span> that <span class="removed"><del><strong>this
+ does not operate via</strong></del></span> the <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>local phone
+ company can use</a>.</p>
+ </li>
+
+ <li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has
a</em></ins></span> back door that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems that this
- does not operate via the</strong></del></span> <span
class="inserted"><ins><em>used by 14,000 Android applications.</p>
+ <p>It is used by 14,000 Android applications.</p>
</li>
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a</em></ins></span> universal back <span
class="removed"><del><strong>door that we know nearly</strong></del></span>
<span class="inserted"><ins><em>door</a>. Nearly</em></ins></span>
+ A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
all
<span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door">
lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">
@@ -1617,7 +1618,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.de.po 17 Oct 2020 08:05:07 -0000
1.141
+++ proprietary/po/malware-mobiles.de.po 10 Nov 2020 17:37:40 -0000
1.142
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -133,7 +133,7 @@
"are-stalin-s-dream-says-free-software-movement-founder.html\">Stalin's "
"dream</q>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/malware-mobiles.es-en.html 17 Oct 2020 12:00:47 -0000
1.75
+++ proprietary/po/malware-mobiles.es-en.html 10 Nov 2020 17:37:40 -0000
1.76
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Nearly all mobile phones do two grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
@@ -65,7 +65,7 @@
href="/proprietary/malware-apple.html">Apple's Operating Systems are
Malware</a> and <a href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 12:00:47 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary/po/malware-mobiles.es.po 17 Oct 2020 12:00:47 -0000
1.196
+++ proprietary/po/malware-mobiles.es.po 10 Nov 2020 17:37:40 -0000
1.197
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -93,7 +93,7 @@
"rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los "
"llamamos «el sueño de Stalin»."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary/po/malware-mobiles.fr-en.html 17 Oct 2020 08:59:36 -0000
1.99
+++ proprietary/po/malware-mobiles.fr-en.html 10 Nov 2020 17:37:40 -0000
1.100
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Nearly all mobile phones do two grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
@@ -65,7 +65,7 @@
href="/proprietary/malware-apple.html">Apple's Operating Systems are
Malware</a> and <a href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary/po/malware-mobiles.fr.po 17 Oct 2020 08:29:20 -0000
1.210
+++ proprietary/po/malware-mobiles.fr.po 10 Nov 2020 17:37:40 -0000
1.211
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -88,7 +88,7 @@
"de deux manières : ils suivent leurs mouvements et ils écoutent leurs "
"conversations. C'est pourquoi nous les appelons « le rêve de Staline »."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.it-diff.html 17 Oct 2020 08:05:07 -0000
1.90
+++ proprietary/po/malware-mobiles.it-diff.html 10 Nov 2020 17:37:40 -0000
1.91
@@ -102,7 +102,7 @@
<li><a href="#drm">Digital restrictions
management</a> or “DRM” means functionalities designed
to restrict what users can</strong></del></span> <span
class="inserted"><ins><em>class="article">
-<div class="italic">
+<blockquote>
<p>Nearly all mobile phones</em></ins></span> do <span
class="removed"><del><strong>with the data in</strong></del></span> <span
class="inserted"><ins><em>two grievous wrongs to</em></ins></span> their <span
class="removed"><del><strong>computers.</li>
<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
@@ -120,28 +120,27 @@
<ul>
<li>
<p>The universal back door</strong></del></span> <span
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
-Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most</strong></del></span> mobile <span
class="removed"><del><strong>phones have this universal back door, which has
been
- used to</strong></del></span> <span class="inserted"><ins><em>software
released by Apple or
-Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about</strong></del></span>
+Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>mobile software released by Apple or
+Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple's
Operating Systems are
-Malware</a> and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google's
+Malware</a> and <a href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
<div class="important">
-<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in</em></ins></span> this <span
class="removed"><del><strong>problem</a>.</p>
+<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
+ <p>Most mobile phones have</strong></del></span> <span
class="inserted"><ins><em>be in</em></ins></span> this <span
class="removed"><del><strong>universal back door, which has been
+ used</strong></del></span> <span class="inserted"><ins><em>page but isn't
+here, please write</em></ins></span>
+to <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
+to inform us. Please include the URL</em></ins></span> of <span
class="removed"><del><strong>this problem</a>.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span class="inserted"><ins><em>page but isn't
-here, please write
-to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of</em></ins></span> a
+ Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> a
<span class="removed"><del><strong>back door</a> that provides remote
access</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
to <span class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
@@ -223,19 +222,20 @@
<ul>
<li>
- <p>Siri, Alexa, and all</strong></del></span> <span
class="inserted"><ins><em>the
- back door, but at least it is unable to turn the phone unto a
+ <p>Siri, Alexa, and all</strong></del></span> the <span
class="removed"><del><strong>other voice-control systems can
be</strong></del></span>
+ <span class="inserted"><ins><em>back door, but at least it is unable to
turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make phones
<a
-
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ <p>The universal back door is apparently also used to make
phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
are tracked, and may also make the listening feature work.</p>
</li>
</ul>
<div id="TOC">
-<h3>Types of malware in mobiles</h3>
+<h3>Types of malware</em></ins></span> in <span
class="removed"><del><strong>ultrasound that humans can't hear</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>mobiles</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
@@ -257,10 +257,13 @@
<li id="M209900001">
<p>See above for the <a
href="#universal-back-door-phone-modem">general universal back
door</a> in essentially all mobile phones, which permits converting
- them into full-time listening devices.</p>
+ them into full-time listening devices.</p></em></ins></span>
</li>
- <li id="M202001090">
+<span class="removed"><del><strong><li>
+ <p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202001090">
<p>Android phones subsidized by the US government come with <a
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
preinstalled adware and a back door for forcing installation of
@@ -274,30 +277,34 @@
<p>In other words, a program whose raison d'être is malicious has
a secret secondary malicious purpose. All this is in addition to the
- malware of Android itself.</p>
+ malware of</em></ins></span> Android <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>itself.</p>
</li>
<li id="M201908270">
<p>A very popular app found in the
- Google Play store contained a module that was designed to <a
-
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
+ Google Play store contained a module that was designed
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
regularly used it to make the computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
- run nonfree apps. They can never be completely sure that a nonfree
- app is safe.</p>
+ run nonfree apps. They</em></ins></span> can <span
class="inserted"><ins><em>never</em></ins></span> be <span
class="removed"><del><strong>hijacked through their Wi-Fi chips</a>
because of</strong></del></span> <span class="inserted"><ins><em>completely
sure that</em></ins></span> a <span class="removed"><del><strong>bug in
+ Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree
+ app is safe.</p></em></ins></span>
</li>
- <li id="M201609130">
- <p>Xiaomi phones come with <a
-
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">
- a universal back door in the application processor, for Xiaomi's
+<span class="removed"><del><strong><li>
+<p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609130">
+ <p>Xiaomi</em></ins></span> phones <span
class="inserted"><ins><em>come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"></em></ins></span>
+ a <span class="removed"><del><strong>security hole</strong></del></span>
<span class="inserted"><ins><em>universal back door in the application
processor, for Xiaomi's
use</a>.</p>
<p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
+ universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>the local phone
company can use</a>.</p>
</li>
@@ -958,7 +965,7 @@
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
- <p>On</em></ins></span> the other <span
class="removed"><del><strong>voice-control systems</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
+ <p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
@@ -976,51 +983,41 @@
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we</em></ins></span> can <span
class="removed"><del><strong>be</strong></del></span> <span
class="inserted"><ins><em>depend on each other.</p>
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>play
commands in ultrasound</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>humans can't hear</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234</em></ins></span> Android <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>apps that track users by</em></ins></span> <a
<span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a>
because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots</em></ins></span> of <span
class="removed"><del><strong>a bug</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data</em></ins></span> in
- <span class="removed"><del><strong>Broadcom's non-free
firmware.</p></strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Samsung
-phones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>security hole</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>install
@@ -1627,7 +1624,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.it.po 17 Oct 2020 08:05:07 -0000
1.141
+++ proprietary/po/malware-mobiles.it.po 10 Nov 2020 17:37:40 -0000
1.142
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -118,14 +118,14 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/malware-mobiles.ja-diff.html 17 Oct 2020 08:05:07 -0000
1.108
+++ proprietary/po/malware-mobiles.ja-diff.html 10 Nov 2020 17:37:40 -0000
1.109
@@ -79,20 +79,31 @@
runs. However, in practice nonfree software</strong></del></span> <span
class="inserted"><ins><em>users; <a
href="/philosophy/free-software-even-more-important.html">that</em></ins></span>
is <span class="removed"><del><strong>often malware,
because</strong></del></span> the <span
class="removed"><del><strong>developer's awareness</strong></del></span>
<span class="inserted"><ins><em>basic injustice</a>. The developers and
manufacturers often exercise</em></ins></span>
-that <span class="removed"><del><strong>the users would be
powerless</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> to <span
class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> the <span
class="removed"><del><strong>developer to impose some.
+that <span class="inserted"><ins><em>power to the detriment
of</em></ins></span> the users <span class="removed"><del><strong>would be
powerless</strong></del></span> <span class="inserted"><ins><em>they
ought</em></ins></span> to <span class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> <span
class="inserted"><ins><em>serve.</p>
+
+<p>This typically takes</em></ins></span> the <span
class="removed"><del><strong>developer to impose some.
</p>
</div>
-<p>Here are examples</strong></del></span> <span
class="inserted"><ins><em>detriment</em></ins></span> of <span
class="removed"><del><strong>malware in mobile devices. See
also</strong></del></span> the <span class="removed"><del><strong><a
href="/proprietary/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific</strong></del></span>
<span class="inserted"><ins><em>users they ought</em></ins></span> to <span
class="inserted"><ins><em>serve.</p>
-
-<p>This typically takes</em></ins></span> the <span
class="removed"><del><strong>Apple iThings.</p></strong></del></span>
<span class="inserted"><ins><em>form of malicious functionalities.</p>
+<p>Here are examples</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="inserted"><ins><em>malicious functionalities.</p>
<hr class="full-width" />
-</div></em></ins></span>
+</div>
+
+<div class="article">
+<blockquote>
+<p>Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations. This
+is why we call them “Stalin's dream”.</p>
-<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="article"></em></ins></span>
-<div <span class="removed"><del><strong>class="malfunctions">
+<p>The</em></ins></span> malware <span class="inserted"><ins><em>we list
here is present</em></ins></span> in <span class="removed"><del><strong>mobile
devices. See also
+the <a href="/proprietary/malware-apple.html">the</strong></del></span>
<span class="inserted"><ins><em>every phone, or in software
+that is not made by</em></ins></span> Apple <span
class="removed"><del><strong>malware
+page</a> for malicious</strong></del></span> <span
class="inserted"><ins><em>or Google (including its subsidiaries).
+Malicious</em></ins></span> functionalities <span
class="removed"><del><strong>specific to the</strong></del></span> <span
class="inserted"><ins><em>in mobile software released by</em></ins></span>
Apple <span class="removed"><del><strong>iThings.</p>
+
+<div class="toc">
+<div class="malfunctions">
<ul>
<li><strong>Type of malware</strong></li>
<li><a href="#back-doors">Back doors</a></li>
@@ -102,33 +113,27 @@
<!--<li><a
href="#interference">Interference</a></li>-->
<li><a href="#surveillance">Surveillance</a></li>
<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
- to restrict what users can</strong></del></span> <span
class="inserted"><ins><em>class="italic">
-<p>Nearly all mobile phones</em></ins></span> do <span
class="removed"><del><strong>with the data in</strong></del></span> <span
class="inserted"><ins><em>two grievous wrongs to</em></ins></span> their <span
class="removed"><del><strong>computers.</li>
+ management</a></strong></del></span> or <span
class="removed"><del><strong>“DRM” means functionalities designed
+ to restrict what users can do with the data</strong></del></span>
+<span class="inserted"><ins><em>Google are listed</em></ins></span> in <span
class="removed"><del><strong>their computers.</li>
<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
-<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>users:
-tracking their movements, and listening to their conversations. This
-is why we call them “Stalin's dream”.</p>
+<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>dedicated pages, <a
+href="/proprietary/malware-apple.html">Apple's Operating Systems are
+Malware</a> and <a href="/proprietary/malware-google.html">Google's
+Software Is Malware</a> respectively.</p>
+</blockquote>
-<p>The malware we list here is present in every phone, or in
software</em></ins></span>
-that <span class="removed"><del><strong>reject any operating
system</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> not <span
class="removed"><del><strong>“authorized”</strong></del></span>
<span class="inserted"><ins><em>made</em></ins></span> by <span
class="removed"><del><strong>the
+<div class="important">
+<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>reject any operating system not
“authorized” by the
manufacturer.</li>
</ul>
-</div></strong></del></span> <span class="inserted"><ins><em>Apple or
Google (including its subsidiaries).
-Malicious functionalities in mobile software released by Apple or
-Google are listed in dedicated pages, <a
-href="/proprietary/malware-apple.html">Apple's Operating Systems are
-Malware</a> and <a href="/proprietary/malware-google.html">Google's
-Software Is Malware</a> respectively.</p></em></ins></span>
+</div>
</div>
-<span class="removed"><del><strong><h3 id="back-doors">Mobile Back
Doors</h3>
+<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door</strong></del></span>
-
-<span class="inserted"><ins><em><div class="important">
-<p>If you know of an example that ought to be</em></ins></span> in <span
class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>this page but isn't
+ <li><p>The universal back door</strong></del></span> <span
class="inserted"><ins><em>ought to be</em></ins></span> in <span
class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>this page but isn't
here, please write
to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
@@ -1473,7 +1478,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary/po/malware-mobiles.ja.po 17 Oct 2020 08:05:07 -0000
1.132
+++ proprietary/po/malware-mobiles.ja.po 10 Nov 2020 17:37:40 -0000
1.133
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,14 +100,14 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-mobiles.pot 17 Oct 2020 08:05:07 -0000 1.107
+++ proprietary/po/malware-mobiles.pot 10 Nov 2020 17:37:40 -0000 1.108
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,14 +68,14 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.ru-en.html 19 Oct 2020 10:00:05 -0000
1.102
+++ proprietary/po/malware-mobiles.ru-en.html 10 Nov 2020 17:37:40 -0000
1.103
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Nearly all mobile phones do two grievous wrongs to their users:
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
@@ -65,7 +65,7 @@
href="/proprietary/malware-apple.html">Apple's Operating Systems are
Malware</a> and <a href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -1283,7 +1283,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/malware-mobiles.ru.po 19 Oct 2020 10:00:05 -0000
1.248
+++ proprietary/po/malware-mobiles.ru.po 10 Nov 2020 17:37:40 -0000
1.249
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -89,7 +89,7 @@
"полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¸ пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ.
ÐÐ¾Ñ "
"поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
Index: proprietary/po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-webpages.de-diff.html 24 Jun 2020 05:37:10
-0000 1.30
+++ proprietary/po/malware-webpages.de-diff.html 10 Nov 2020 17:37:40
-0000 1.31
@@ -87,7 +87,7 @@
</div>
<span class="inserted"><ins><em><div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>This page lists web sites containing proprietary JavaScript programs
that spy
on users or mislead them. They make use of what we call
the <a href="/philosophy/javascript-trap.html">JavaScript
Trap</a>. Of course,
@@ -96,7 +96,7 @@
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -160,10 +160,11 @@
<li id="M201712300">
<p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
- swipes usernames from browser-based password managers</a>.</p>
+ swipes usernames from browser-based password
managers</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li></strong></del></span>
- <li id="M201711150">
+ <span class="inserted"><ins><em><li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
@@ -178,11 +179,10 @@
for comments, the proprietary Disqus software <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
a Facebook software package into the browser of every anonymous visitor
- to the page, and makes the page's URL available to
Facebook</a>.</p></em></ins></span>
+ to the page, and makes the page's URL available to
Facebook</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201612064">
+ <li id="M201612064">
<p>Online sales, with tracking and surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>. Most of
@@ -332,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/malware-webpages.de.po 24 Jun 2020 05:37:10 -0000
1.20
+++ proprietary/po/malware-webpages.de.po 10 Nov 2020 17:37:40 -0000
1.21
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-webpages.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-12-05 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
Index: proprietary/po/malware-webpages.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-webpages.es-en.html 24 Jun 2020 05:37:10 -0000
1.3
+++ proprietary/po/malware-webpages.es-en.html 10 Nov 2020 17:37:40 -0000
1.4
@@ -53,13 +53,13 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists web sites containing proprietary JavaScript programs that
spy
on users or mislead them. They make use of what we call
the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
many sites collect information that the user sends, via forms or otherwise, but
here we're not talking about that.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/malware-webpages.es.po 24 Jun 2020 05:37:10 -0000
1.9
+++ proprietary/po/malware-webpages.es.po 10 Nov 2020 17:37:40 -0000
1.10
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-22 11:17+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -80,7 +80,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
Index: proprietary/po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/malware-webpages.fr-en.html 24 Jun 2020 05:37:10 -0000
1.20
+++ proprietary/po/malware-webpages.fr-en.html 10 Nov 2020 17:37:40 -0000
1.21
@@ -53,13 +53,13 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists web sites containing proprietary JavaScript programs that
spy
on users or mislead them. They make use of what we call
the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
many sites collect information that the user sends, via forms or otherwise, but
here we're not talking about that.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-webpages.fr.po 5 Oct 2020 13:13:25 -0000
1.33
+++ proprietary/po/malware-webpages.fr.po 10 Nov 2020 17:37:40 -0000
1.34
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
Index: proprietary/po/malware-webpages.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-webpages.pot 24 Jun 2020 05:37:10 -0000 1.17
+++ proprietary/po/malware-webpages.pot 10 Nov 2020 17:37:40 -0000 1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a "
Index: proprietary/po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/malware-webpages.ru-en.html 24 Jun 2020 05:37:10 -0000
1.21
+++ proprietary/po/malware-webpages.ru-en.html 10 Nov 2020 17:37:40 -0000
1.22
@@ -53,13 +53,13 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists web sites containing proprietary JavaScript programs that
spy
on users or mislead them. They make use of what we call
the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
many sites collect information that the user sends, via forms or otherwise, but
here we're not talking about that.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -285,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/malware-webpages.ru.po 24 Jun 2020 05:37:10 -0000
1.40
+++ proprietary/po/malware-webpages.ru.po 10 Nov 2020 17:37:40 -0000
1.41
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary/po/nl.po 10 Nov 2020 16:02:01 -0000 1.231
+++ proprietary/po/nl.po 10 Nov 2020 17:37:40 -0000 1.232
@@ -3554,7 +3554,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5189,14 +5189,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -6481,7 +6481,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6666,7 +6666,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -6777,7 +6777,7 @@
msgid "Proprietary Addictions"
msgstr "Apple-achterdeuren"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -7034,7 +7034,7 @@
msgid "Proprietary Back Doors"
msgstr "Apple-achterdeuren"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -7289,7 +7289,7 @@
msgid "Proprietary Censorship"
msgstr "Apple-censuur"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -7298,7 +7298,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -7350,7 +7350,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -7377,7 +7377,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -7440,7 +7440,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -7448,7 +7448,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -7531,7 +7531,7 @@
msgid "Proprietary Fraud"
msgstr "Apple-achterdeuren"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -7560,13 +7560,13 @@
msgid "Proprietary Incompatibility"
msgstr "Apple-onveiligheid"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -7574,7 +7574,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -7582,7 +7582,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -7590,7 +7590,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7622,7 +7622,7 @@
msgid "Proprietary Insecurity"
msgstr "Apple-onveiligheid"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7631,7 +7631,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7744,7 +7744,7 @@
msgid "Proprietary Interference"
msgstr "Apple-inmenging"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Various-]{+One kind of malicious functionality mediates developer's
# | interference into the use of the software. This page describes how
# | various+} proprietary programs [-often mess up-] {+harass or annoy the
@@ -7817,7 +7817,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -7825,14 +7825,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -7885,14 +7885,14 @@
msgid "Proprietary Manipulation"
msgstr "Apple-achterdeuren"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7914,13 +7914,13 @@
msgid "Proprietary Obsolescence"
msgstr "Apple-inmenging"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -7928,7 +7928,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -8465,7 +8465,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -8580,7 +8580,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -8590,7 +8590,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -8625,7 +8625,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -8634,7 +8634,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -9421,7 +9421,7 @@
msgid "Proprietary Tethers"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -9429,7 +9429,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -9448,7 +9448,7 @@
msgid "Proprietary Tyrants"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/pl.po 10 Nov 2020 16:02:01 -0000 1.230
+++ proprietary/po/pl.po 10 Nov 2020 17:37:40 -0000 1.231
@@ -3128,7 +3128,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4670,14 +4670,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -5945,7 +5945,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6126,7 +6126,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -6235,7 +6235,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -6490,7 +6490,7 @@
msgid "Proprietary Back Doors"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -6747,7 +6747,7 @@
msgid "Proprietary Censorship"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -6756,7 +6756,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -6806,7 +6806,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -6834,7 +6834,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -6898,7 +6898,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6906,7 +6906,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6987,7 +6987,7 @@
msgid "Proprietary Fraud"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -7014,13 +7014,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -7028,7 +7028,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -7036,7 +7036,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -7044,7 +7044,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7074,7 +7074,7 @@
msgid "Proprietary Insecurity"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7083,7 +7083,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7193,7 +7193,7 @@
msgid "Proprietary Interference"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -7246,7 +7246,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -7254,14 +7254,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -7308,14 +7308,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7335,13 +7335,13 @@
msgid "Proprietary Obsolescence"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -7349,7 +7349,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -7969,7 +7969,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -8085,7 +8085,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -8095,7 +8095,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -8128,7 +8128,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -8137,7 +8137,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -8908,7 +8908,7 @@
msgid "Proprietary Tethers"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -8916,7 +8916,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -8936,7 +8936,7 @@
msgid "Proprietary Tyrants"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary/po/pot 10 Nov 2020 16:02:03 -0000 1.229
+++ proprietary/po/pot 10 Nov 2020 17:37:40 -0000 1.230
@@ -2898,7 +2898,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4397,14 +4397,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -5652,7 +5652,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -5823,7 +5823,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -5927,7 +5927,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -6173,7 +6173,7 @@
msgid "Proprietary Back Doors"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -6406,7 +6406,7 @@
msgid "Proprietary Censorship"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -6415,7 +6415,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -6460,7 +6460,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -6483,7 +6483,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -6543,7 +6543,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6551,7 +6551,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6628,7 +6628,7 @@
msgid "Proprietary Fraud"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -6650,13 +6650,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -6664,7 +6664,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -6672,7 +6672,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -6680,7 +6680,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -6701,7 +6701,7 @@
msgid "Proprietary Insecurity"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -6710,7 +6710,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -6811,7 +6811,7 @@
msgid "Proprietary Interference"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -6860,7 +6860,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -6868,14 +6868,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -6913,14 +6913,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -6935,13 +6935,13 @@
msgid "Proprietary Obsolescence"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -6949,7 +6949,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -7265,7 +7265,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -7376,7 +7376,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -7386,7 +7386,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -7414,7 +7414,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -7423,7 +7423,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -8126,7 +8126,7 @@
msgid "Proprietary Tethers"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -8134,7 +8134,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -8149,7 +8149,7 @@
msgid "Proprietary Tyrants"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/potential-malware.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/potential-malware.de-diff.html 24 Jun 2020 05:37:10
-0000 1.8
+++ proprietary/po/potential-malware.de-diff.html 10 Nov 2020 17:37:40
-0000 1.9
@@ -65,14 +65,15 @@
<p>This typically takes the form of malicious functionalities.</p>
<hr class="full-width" />
-</div>
+</div></em></ins></span>
-<div class="article"></em></ins></span>
-<div <span
class="removed"><del><strong>class="comment"></strong></del></span> <span
class="inserted"><ins><em>class="italic"></em></ins></span>
+<div <span
class="removed"><del><strong>class="comment"></strong></del></span> <span
class="inserted"><ins><em>class="article">
+<blockquote></em></ins></span>
<p>This page describes malicious techniques that proprietary
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
-</div>
+<span class="removed"><del><strong></div></strong></del></span>
+<span class="inserted"><ins><em></blockquote></em></ins></span>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -207,7 +208,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/potential-malware.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/potential-malware.de.po 24 Jun 2020 05:37:10 -0000
1.14
+++ proprietary/po/potential-malware.de.po 10 Nov 2020 17:37:40 -0000
1.15
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: potential-malware.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
Index: proprietary/po/potential-malware.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/potential-malware.es-en.html 24 Jun 2020 05:37:10 -0000
1.3
+++ proprietary/po/potential-malware.es-en.html 10 Nov 2020 17:37:40 -0000
1.4
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page describes malicious techniques that proprietary
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -188,7 +188,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/potential-malware.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/potential-malware.es.po 24 Jun 2020 05:37:10 -0000
1.7
+++ proprietary/po/potential-malware.es.po 10 Nov 2020 17:37:40 -0000
1.8
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-22 11:19+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
Index: proprietary/po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/potential-malware.fr-en.html 24 Jun 2020 05:37:10 -0000
1.17
+++ proprietary/po/potential-malware.fr-en.html 10 Nov 2020 17:37:40 -0000
1.18
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page describes malicious techniques that proprietary
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -188,7 +188,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/potential-malware.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/potential-malware.fr.po 5 Oct 2020 13:13:25 -0000
1.22
+++ proprietary/po/potential-malware.fr.po 10 Nov 2020 17:37:40 -0000
1.23
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
Index: proprietary/po/potential-malware.pot
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/potential-malware.pot 24 Jun 2020 05:37:10 -0000
1.11
+++ proprietary/po/potential-malware.pot 10 Nov 2020 17:37:40 -0000
1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
Index: proprietary/po/potential-malware.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/potential-malware.ru-en.html 24 Jun 2020 05:37:10 -0000
1.17
+++ proprietary/po/potential-malware.ru-en.html 10 Nov 2020 17:37:40 -0000
1.18
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page describes malicious techniques that proprietary
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
-</div>
+</blockquote>
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
@@ -188,7 +188,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/potential-malware.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/potential-malware.ru.po 24 Jun 2020 05:04:03 -0000
1.26
+++ proprietary/po/potential-malware.ru.po 10 Nov 2020 17:37:40 -0000
1.27
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
Index: proprietary/po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-addictions.es-en.html 29 Oct 2020 11:29:54
-0000 1.18
+++ proprietary/po/proprietary-addictions.es-en.html 10 Nov 2020 17:37:40
-0000 1.19
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page deals with malicious functionalities that are added to
some programs for the sole purpose of luring users into more and more
frequent and intensive use of the program, with the risk of getting
addicted.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/29 11:29:54 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/proprietary-addictions.es.po 29 Oct 2020 11:29:54 -0000
1.56
+++ proprietary/po/proprietary-addictions.es.po 10 Nov 2020 17:37:40 -0000
1.57
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
Index: proprietary/po/proprietary-addictions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-addictions.fr-en.html 29 Oct 2020 09:00:32
-0000 1.24
+++ proprietary/po/proprietary-addictions.fr-en.html 10 Nov 2020 17:37:40
-0000 1.25
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page deals with malicious functionalities that are added to
some programs for the sole purpose of luring users into more and more
frequent and intensive use of the program, with the risk of getting
addicted.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/29 09:00:32 $
+$Date: 2020/11/10 17:37:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-addictions.fr.po 29 Oct 2020 08:51:33 -0000
1.58
+++ proprietary/po/proprietary-addictions.fr.po 10 Nov 2020 17:37:40 -0000
1.59
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-10-29 09:49+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
Index: proprietary/po/proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-addictions.pot 28 Oct 2020 23:00:58 -0000
1.28
+++ proprietary/po/proprietary-addictions.pot 10 Nov 2020 17:37:40 -0000
1.29
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
Index: proprietary/po/proprietary-addictions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-addictions.ru-en.html 29 Oct 2020 11:00:28
-0000 1.24
+++ proprietary/po/proprietary-addictions.ru-en.html 10 Nov 2020 17:37:41
-0000 1.25
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page deals with malicious functionalities that are added to
some programs for the sole purpose of luring users into more and more
frequent and intensive use of the program, with the risk of getting
addicted.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/29 11:00:28 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-addictions.ru.po 29 Oct 2020 11:00:28 -0000
1.55
+++ proprietary/po/proprietary-addictions.ru.po 10 Nov 2020 17:37:41 -0000
1.56
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
Index: proprietary/po/proprietary-addictions.tr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-addictions.tr-en.html 29 Oct 2020 17:01:53
-0000 1.5
+++ proprietary/po/proprietary-addictions.tr-en.html 10 Nov 2020 17:37:41
-0000 1.6
@@ -53,12 +53,12 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page deals with malicious functionalities that are added to
some programs for the sole purpose of luring users into more and more
frequent and intensive use of the program, with the risk of getting
addicted.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/29 17:01:53 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-addictions.tr.po 29 Oct 2020 17:01:53 -0000
1.23
+++ proprietary/po/proprietary-addictions.tr.po 10 Nov 2020 17:37:41 -0000
1.24
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2020-10-28 22:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-10-29 17:46+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Bu genellikle kötücül iÅlevsellikler biçimini alır."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-back-doors.de-diff.html 17 Oct 2020 08:05:08
-0000 1.47
+++ proprietary/po/proprietary-back-doors.de-diff.html 10 Nov 2020 17:37:41
-0000 1.48
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
examples of <span class="removed"><del><strong>demonstrated back doors in
proprietary software.
@@ -77,7 +77,7 @@
Back doors that allow full control over the <span
class="removed"><del><strong>operating system</strong></del></span> <span
class="inserted"><ins><em>programs which contain them</em></ins></span>
are said to be
<span
class="removed"><del><strong>“universal”.</p></strong></del></span>
<span class="inserted"><ins><em>“universal.”</p>
-</div>
+</blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -365,7 +365,7 @@
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on</em></ins></span> the <span
class="removed"><del><strong>article for the facts</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>. The app developers
regularly used</em></ins></span> it <span
class="removed"><del><strong>presents. It is too bad
- that</strong></del></span> <span class="inserted"><ins><em>to
make</em></ins></span> the <span class="removed"><del><strong>article
finishes</strong></del></span> <span class="inserted"><ins><em>computer
download and execute any code
+ that</strong></del></span> <span class="inserted"><ins><em>to
make</em></ins></span> the <span class="removed"><del><strong>article finishes
by advocating</strong></del></span> <span class="inserted"><ins><em>computer
download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
@@ -428,7 +428,7 @@
load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
- is too bad that the article finishes</em></ins></span> by advocating the
+ is too bad that the article finishes by advocating</em></ins></span> the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
@@ -455,7 +455,7 @@
door</a>, Windows 8</em></ins></span> has a back door <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>for <a
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely <span class="removed"><del><strong>delete apps.</a> (It
was in a
- program called GTalkService, which</strong></del></span> <span
class="inserted"><ins><em>deleting apps</a>.</p>
+ program called</strong></del></span> <span
class="inserted"><ins><em>deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
@@ -468,7 +468,7 @@
<p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
Google has a back door to remotely delete apps</a>. (It was in a
- program called GTalkService, which</em></ins></span> seems since then to
have been
+ program called</em></ins></span> GTalkService, which seems since then to
have been
merged into Google Play.)</p>
<p>Google can also <a
@@ -953,7 +953,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-back-doors.de.po 17 Oct 2020 08:05:08 -0000
1.144
+++ proprietary/po/proprietary-back-doors.de.po 10 Nov 2020 17:37:41 -0000
1.145
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | {+Some malicious functionalities are mediated by <a
# | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+} Here are
# | examples of [-demonstrated back doors in proprietary software. They are
Index: proprietary/po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-back-doors.es-en.html 18 Oct 2020 09:59:20
-0000 1.21
+++ proprietary/po/proprietary-back-doors.es-en.html 10 Nov 2020 17:37:41
-0000 1.22
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>. Here are
examples of programs that contain one or several of those, classified
according to what the back door is known to have the power to do.
Back doors that allow full control over the programs which contain them
are said to be “universal.”</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-back-doors.es.po 18 Oct 2020 09:51:17 -0000
1.46
+++ proprietary/po/proprietary-back-doors.es.po 10 Nov 2020 17:37:41 -0000
1.47
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-10-18 11:12+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/proprietary-back-doors.fr-en.html 17 Oct 2020 08:59:36
-0000 1.81
+++ proprietary/po/proprietary-back-doors.fr-en.html 10 Nov 2020 17:37:41
-0000 1.82
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>. Here are
examples of programs that contain one or several of those, classified
according to what the back door is known to have the power to do.
Back doors that allow full control over the programs which contain them
are said to be “universal.”</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary-back-doors.fr.po 17 Oct 2020 08:29:20 -0000
1.168
+++ proprietary/po/proprietary-back-doors.fr.po 10 Nov 2020 17:37:41 -0000
1.169
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-back-doors.it-diff.html 17 Oct 2020 08:05:08
-0000 1.73
+++ proprietary/po/proprietary-back-doors.it-diff.html 10 Nov 2020 17:37:41
-0000 1.74
@@ -68,14 +68,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those,
classified
according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to have the power to do.
Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full
control over the programs which contain them
are said to be “universal.”</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be</em></ins></span> in <span
class="removed"><del><strong>proprietary software.</p>
@@ -156,15 +156,16 @@
<li <span
class="removed"><del><strong>id="chrome-erase-addons"><p>Chrome</strong></del></span>
<span class="inserted"><ins><em>id="M201512280">
<p>Microsoft</em></ins></span> has <span
class="removed"><del><strong>a back door</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">for
- remote erasure of add-ons</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- backdoored its disk encryption</a>.</p></em></ins></span>
+ remote erasure of add-ons</a>.</p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>WhatsApp</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ backdoored its disk encryption</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201409220">
+ <li id="M201409220">
<p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">has
a back door that the company can use to read</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
@@ -1013,7 +1014,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary-back-doors.it.po 17 Oct 2020 08:05:08 -0000
1.136
+++ proprietary/po/proprietary-back-doors.it.po 10 Nov 2020 17:37:41 -0000
1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-back-doors.ja-diff.html 17 Oct 2020 08:05:08
-0000 1.74
+++ proprietary/po/proprietary-back-doors.ja-diff.html 10 Nov 2020 17:37:41
-0000 1.75
@@ -68,14 +68,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those,
classified
according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to have the power to do.
Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full
control over the programs which contain them
are said to be “universal.”</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be</em></ins></span> in <span
class="removed"><del><strong>proprietary software.</p>
@@ -972,7 +972,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary-back-doors.ja.po 17 Oct 2020 08:05:08 -0000
1.120
+++ proprietary/po/proprietary-back-doors.ja.po 10 Nov 2020 17:37:41 -0000
1.121
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of demonstrated back doors in proprietary software."
Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary-back-doors.pot 17 Oct 2020 08:05:08 -0000
1.85
+++ proprietary/po/proprietary-back-doors.pot 10 Nov 2020 17:37:41 -0000
1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a "
"href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are examples "
Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/proprietary-back-doors.ru-en.html 19 Oct 2020 10:00:05
-0000 1.83
+++ proprietary/po/proprietary-back-doors.ru-en.html 10 Nov 2020 17:37:41
-0000 1.84
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>. Here are
examples of programs that contain one or several of those, classified
according to what the back door is known to have the power to do.
Back doors that allow full control over the programs which contain them
are said to be “universal.”</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -731,7 +731,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary/po/proprietary-back-doors.ru.po 19 Oct 2020 10:00:05 -0000
1.212
+++ proprietary/po/proprietary-back-doors.ru.po 10 Nov 2020 17:37:41 -0000
1.213
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
Index: proprietary/po/proprietary-censorship.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-censorship.de-diff.html 10 Nov 2020 13:02:57
-0000 1.8
+++ proprietary/po/proprietary-censorship.de-diff.html 10 Nov 2020 17:37:41
-0000 1.9
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality is</em></ins></span> censorship
<span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> what <span
class="removed"><del><strong>their</strong></del></span>
users can access. <span class="inserted"><ins><em>Here are examples of
programs which do this.</em></ins></span>
We have a <a
@@ -78,7 +78,7 @@
<p>Selling products designed as platforms for a
company to impose censorship ought to be forbidden by law, but it
isn't.</p>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em></blockquote></em></ins></span>
<div <span class="removed"><del><strong>class="important"
style="margin-bottom: 2em"></strong></del></span> <span
class="inserted"><ins><em>class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -229,7 +229,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-censorship.de.po 10 Nov 2020 13:02:57 -0000
1.54
+++ proprietary/po/proprietary-censorship.de.po 10 Nov 2020 17:37:41 -0000
1.55
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
# | can access. {+Here are examples of programs which do this.+} We have a
@@ -151,7 +151,7 @@
"Installation von Anwenderprogrammen zensieren (wir nennen sie "
"<em>Gefängnisse</em>)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-censorship.es.po 10 Nov 2020 13:02:57 -0000
1.58
+++ proprietary/po/proprietary-censorship.es.po 10 Nov 2020 17:37:41 -0000
1.59
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-20 12:43+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -96,7 +96,7 @@
"privativos que censuran la instalación</a> de programas de aplicación (los "
"llamamos «prisiones»)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-censorship.fr.po 10 Nov 2020 13:02:57 -0000
1.61
+++ proprietary/po/proprietary-censorship.fr.po 10 Nov 2020 17:37:41 -0000
1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -92,7 +92,7 @@
"\">liste distincte des systèmes privateurs qui censurent l'installation</a> "
"d'applications (on les appelle les “prisons”.)"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-censorship.it-diff.html 10 Nov 2020 13:02:57
-0000 1.28
+++ proprietary/po/proprietary-censorship.it-diff.html 10 Nov 2020 17:37:41
-0000 1.29
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality is</em></ins></span> censorship
<span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> what <span
class="removed"><del><strong>their</strong></del></span>
users can access. <span class="inserted"><ins><em>Here are examples of
programs which do this.</em></ins></span>
We have a <a
@@ -83,7 +83,7 @@
<li><p>Chrome
<a href="https://support.google.com/chrome/answer/6261569?hl=en">
censors downloads</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know</em></ins></span> of <span
class="removed"><del><strong>software</a>.</p>
@@ -122,14 +122,14 @@
The</strong></del></span>
<span class="inserted"><ins><em><li id="M201701180">
- <p>On Windows and MacOS, Chrome <a
-
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq">
+ <p>On Windows and MacOS, Chrome</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq">
disables extensions</a> that are not hosted in the Chrome Web
Store.</p>
- <p>For example, an extension was</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
+ <p>For example, an extension was <a
+
href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
banned from the Chrome Web Store, and permanently disabled</a> on
more than 40,000 computers.</p>
</li>
@@ -245,7 +245,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-censorship.it.po 10 Nov 2020 13:02:57 -0000
1.57
+++ proprietary/po/proprietary-censorship.it.po 10 Nov 2020 17:37:41 -0000
1.58
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2017-07-06 22:33+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here are examples-]{+One kind+} of [-proprietary systems that impose-]
# | {+malicious functionality is+} censorship o[-n-]{+f+} what [-their-] users
# | can access. {+Here are examples of programs which do this.+} We have a
@@ -145,7 +145,7 @@
"proprietari che censurano l'installazione</a> di programmi (che chiamiamo "
"“prigioni”)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-censorship.ja-diff.html 10 Nov 2020 13:02:57
-0000 1.34
+++ proprietary/po/proprietary-censorship.ja-diff.html 10 Nov 2020 17:37:41
-0000 1.35
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality is</em></ins></span> censorship
<span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> what <span
class="removed"><del><strong>their</strong></del></span>
users can access. <span class="inserted"><ins><em>Here are examples of
programs which do this.</em></ins></span>
We have a <a
@@ -83,7 +83,7 @@
<li><p>
Apple censors
games,</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -268,7 +268,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 13:02:57 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-censorship.ja.po 10 Nov 2020 13:02:57 -0000
1.45
+++ proprietary/po/proprietary-censorship.ja.po 10 Nov 2020 17:37:41 -0000
1.46
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2016-04-05 14:30+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary systems that impose censorship on what "
@@ -120,7 +120,7 @@
"proprietary-jails.html\">ã¤ã³ã¹ãã¬ã¼ã·ã§ã³ãæ¤é²ãããããã©ã¤ã¨ã¿ãªãªã·ã¹ã"
"ã
ã®ãªã¹ã</a>(ããããã¡ã¯ããããç¢çãã¨å¼ã³ã¾ã)ã¯å¥ã«ããã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-censorship.pot 10 Nov 2020 13:02:57 -0000
1.29
+++ proprietary/po/proprietary-censorship.pot 10 Nov 2020 17:37:41 -0000
1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-censorship.html\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a "
@@ -77,7 +77,7 @@
"call them “jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-censorship.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-censorship.ru-en.html 10 Nov 2020 13:30:52
-0000 1.32
+++ proprietary/po/proprietary-censorship.ru-en.html 10 Nov 2020 17:37:41
-0000 1.33
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality is censorship of what
users can access. Here are examples of programs which do this.
We have a <a
@@ -63,7 +63,7 @@
<p>Selling products designed as platforms for a
company to impose censorship ought to be forbidden by law, but it
isn't.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -209,7 +209,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 13:30:52 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-censorship.ru.po 10 Nov 2020 13:30:52 -0000
1.70
+++ proprietary/po/proprietary-censorship.ru.po 10 Nov 2020 17:37:41 -0000
1.71
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 12:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -93,7 +93,7 @@
"коÑоÑÑе подвеÑгаÑÑ ÑензÑÑе ÑÑÑановкÑ</a>
пÑикладнÑÑ
пÑогÑамм (Ð¼Ñ Ð½Ð°Ð·Ñваем "
"ÑÑо “ÑÑÑÑмами”)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
Index: proprietary/po/proprietary-coverups.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-coverups.de-diff.html 24 Jun 2020 05:37:11
-0000 1.5
+++ proprietary/po/proprietary-coverups.de-diff.html 10 Nov 2020 17:37:41
-0000 1.6
@@ -67,11 +67,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This</em></ins></span> page lists instances where proprietary
software had a bug,
and the developers converted it into a malicious functionality by
trying to cover up the existence of the bug.</p>
-<span class="inserted"><ins><em></div></em></ins></span>
+<span class="inserted"><ins><em></blockquote></em></ins></span>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -156,7 +156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-coverups.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-coverups.de.po 24 Jun 2020 05:37:11 -0000
1.13
+++ proprietary/po/proprietary-coverups.de.po 10 Nov 2020 17:37:41 -0000
1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 03:05+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -121,7 +121,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-coverups.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-coverups.es-en.html 24 Jun 2020 05:37:11
-0000 1.3
+++ proprietary/po/proprietary-coverups.es-en.html 10 Nov 2020 17:37:41
-0000 1.4
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists instances where proprietary software had a bug,
and the developers converted it into a malicious functionality by
trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-coverups.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-coverups.es.po 24 Jun 2020 05:37:11 -0000
1.9
+++ proprietary/po/proprietary-coverups.es.po 10 Nov 2020 17:37:41 -0000
1.10
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-20 12:36+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Español <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-coverups.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-coverups.fr-en.html 24 Jun 2020 05:37:11
-0000 1.15
+++ proprietary/po/proprietary-coverups.fr-en.html 10 Nov 2020 17:37:41
-0000 1.16
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists instances where proprietary software had a bug,
and the developers converted it into a malicious functionality by
trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-coverups.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-coverups.fr.po 5 Oct 2020 13:13:25 -0000
1.18
+++ proprietary/po/proprietary-coverups.fr.po 10 Nov 2020 17:37:41 -0000
1.19
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-coverups.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-coverups.ja-diff.html 31 Jul 2020 03:03:45
-0000 1.25
+++ proprietary/po/proprietary-coverups.ja-diff.html 10 Nov 2020 17:37:41
-0000 1.26
@@ -67,14 +67,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This</em></ins></span> page lists instances where proprietary
software had a bug,
and the developers converted it into a malicious functionality by
trying to cover up the existence of the bug.</p>
<span class="removed"><del><strong><ul>
<li><p>Price</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -158,7 +158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-coverups.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-coverups.ja.po 24 Jun 2020 05:37:11 -0000
1.13
+++ proprietary/po/proprietary-coverups.ja.po 10 Nov 2020 17:37:41 -0000
1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-01-17 15:05+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-coverups.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.pot,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-coverups.pot 24 Jun 2020 05:37:11 -0000
1.9
+++ proprietary/po/proprietary-coverups.pot 10 Nov 2020 17:37:41 -0000
1.10
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-coverups.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-coverups.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-coverups.ru-en.html 24 Jun 2020 05:37:11
-0000 1.15
+++ proprietary/po/proprietary-coverups.ru-en.html 10 Nov 2020 17:37:41
-0000 1.16
@@ -53,11 +53,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists instances where proprietary software had a bug,
and the developers converted it into a malicious functionality by
trying to cover up the existence of the bug.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -138,7 +138,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-coverups.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-coverups.ru.po 24 Jun 2020 05:04:03 -0000
1.20
+++ proprietary/po/proprietary-coverups.ru.po 10 Nov 2020 17:37:41 -0000
1.21
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
Index: proprietary/po/proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-deception.de-diff.html 23 Jul 2020 08:33:20
-0000 1.36
+++ proprietary/po/proprietary-deception.de-diff.html 10 Nov 2020 17:37:41
-0000 1.37
@@ -67,14 +67,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality that makes the program</em></ins></span>
dishonest or conceals <span class="inserted"><ins><em>trickery. Here are
examples of such
malicious functionalities. Cases of</em></ins></span> deception <span
class="removed"><del><strong>or trickery.</p></strong></del></span> <span
class="inserted"><ins><em>that involve taking
people's money are listed in <a
href="/proprietary/proprietary-fraud.html#main-heading">
Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -89,8 +89,11 @@
<ul class="blurbs">
<li id="M202002020">
<p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ them to decide what permissions to give</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>program, and
then</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
bypassing these permissions</a>.</p>
<p>The Android system is supposed to prevent data leaks by running
apps
@@ -103,18 +106,15 @@
<p id="M201509210">Volkswagen programmed its car engine computers to
<a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>time. In real
driving, the cars exceeded
+ run dirty the rest of the time. In real driving, the cars exceeded
emissions standards by a factor of up to 35.</p>
<p>Using free software would not have stopped Volkswagen from
programming it this way, but would have made it harder to conceal,
and given the users the possibility of correcting the deception.</p>
- <p>Former executives of Volkswagen are being</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ <p>Former executives of Volkswagen are being <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
@@ -262,7 +262,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/23 08:33:20 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-deception.de.po 23 Jul 2020 08:33:20 -0000
1.48
+++ proprietary/po/proprietary-deception.de.po 10 Nov 2020 17:37:41 -0000
1.49
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:43+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
Index: proprietary/po/proprietary-deception.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-deception.es-en.html 24 Jul 2020 09:00:30
-0000 1.9
+++ proprietary/po/proprietary-deception.es-en.html 10 Nov 2020 17:37:41
-0000 1.10
@@ -53,14 +53,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Deception is a malicious functionality that makes the program
dishonest or conceals trickery. Here are examples of such
malicious functionalities. Cases of deception that involve taking
people's money are listed in <a
href="/proprietary/proprietary-fraud.html#main-heading">
Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/24 09:00:30 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-deception.es.po 24 Jul 2020 08:38:26 -0000
1.22
+++ proprietary/po/proprietary-deception.es.po 10 Nov 2020 17:37:41 -0000
1.23
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-07-24 10:31+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
Index: proprietary/po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-deception.fr-en.html 23 Jul 2020 10:02:28
-0000 1.34
+++ proprietary/po/proprietary-deception.fr-en.html 10 Nov 2020 17:37:41
-0000 1.35
@@ -53,14 +53,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Deception is a malicious functionality that makes the program
dishonest or conceals trickery. Here are examples of such
malicious functionalities. Cases of deception that involve taking
people's money are listed in <a
href="/proprietary/proprietary-fraud.html#main-heading">
Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/23 10:02:28 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-deception.fr.po 5 Oct 2020 13:13:25 -0000
1.61
+++ proprietary/po/proprietary-deception.fr.po 10 Nov 2020 17:37:41 -0000
1.62
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-07-23 10:55+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: fr <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
Index: proprietary/po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-deception.ja-diff.html 31 Jul 2020 03:03:45
-0000 1.42
+++ proprietary/po/proprietary-deception.ja-diff.html 10 Nov 2020 17:37:41
-0000 1.43
@@ -67,14 +67,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality that makes the program</em></ins></span>
dishonest or conceals <span class="inserted"><ins><em>trickery. Here are
examples of such
malicious functionalities. Cases of</em></ins></span> deception <span
class="inserted"><ins><em>that involve taking
people's money are listed in <a
href="/proprietary/proprietary-fraud.html#main-heading">
Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -163,9 +163,9 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span class="removed"><del><strong>there</a>.
+ people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li>
<p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings
@@ -173,9 +173,9 @@
<p>This allows a company such as Apple to say, “We allow
users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ understand how to actually turn it off.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
<p>A top-ranking proprietary Instagram client promising
@@ -262,7 +262,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/proprietary-deception.ja.po 23 Jul 2020 08:33:20 -0000
1.49
+++ proprietary/po/proprietary-deception.ja.po 10 Nov 2020 17:37:41 -0000
1.50
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-11-18 13:31+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
Index: proprietary/po/proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-deception.pot 23 Jul 2020 08:33:20 -0000
1.32
+++ proprietary/po/proprietary-deception.pot 10 Nov 2020 17:37:41 -0000
1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious "
Index: proprietary/po/proprietary-deception.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/proprietary-deception.ru-en.html 23 Jul 2020 09:30:18
-0000 1.33
+++ proprietary/po/proprietary-deception.ru-en.html 10 Nov 2020 17:37:41
-0000 1.34
@@ -53,14 +53,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Deception is a malicious functionality that makes the program
dishonest or conceals trickery. Here are examples of such
malicious functionalities. Cases of deception that involve taking
people's money are listed in <a
href="/proprietary/proprietary-fraud.html#main-heading">
Proprietary Fraud</a>.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -215,7 +215,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/23 09:30:18 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary-deception.ru.po 23 Jul 2020 09:30:18 -0000
1.69
+++ proprietary/po/proprietary-deception.ru.po 10 Nov 2020 17:37:41 -0000
1.70
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-23 08:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
Index: proprietary/po/proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.de-diff.html 17 Oct 2020 08:05:08 -0000
1.32
+++ proprietary/po/proprietary-drm.de-diff.html 10 Nov 2020 17:37:41 -0000
1.33
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -84,7 +84,7 @@
<span class="removed"><del><strong><ul>
<li><p>DRM does more nastiness to published works than merely
stopping
people from looking at and/or copying them. Even when it
allows</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If</em></ins></span> you <span class="inserted"><ins><em>know of an
example that ought</em></ins></span> to
@@ -226,14 +226,14 @@
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed to <a
-
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
+ iPhone 7 contains DRM specifically designed to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
<p><small>(The article uses the term “lock”
- to describe the DRM, but we prefer to use the term</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks">
digital
+ to describe the DRM, but we prefer to use the term <a
+ href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.)</small></p>
</li>
@@ -550,7 +550,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-drm.de.po 17 Oct 2020 08:05:08 -0000
1.73
+++ proprietary/po/proprietary-drm.de.po 10 Nov 2020 17:37:41 -0000
1.74
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -135,7 +135,7 @@
"Nutzer tun können. Diese Funktionalitäten werden auch <em>digitale "
"Handschellen</em> genannt."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-drm.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-drm.es-en.html 18 Oct 2020 09:59:20 -0000
1.5
+++ proprietary/po/proprietary-drm.es-en.html 10 Nov 2020 17:37:41 -0000
1.6
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
Please support our campaign
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-drm.es.po 18 Oct 2020 09:51:17 -0000
1.16
+++ proprietary/po/proprietary-drm.es.po 10 Nov 2020 17:37:41 -0000
1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-18 11:13+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -84,7 +84,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -97,7 +97,7 @@
"diseñadas para restringir lo que los usuarios pueden hacer. Estas "
"funcionalidades también se conocen como <em>esposas digitales</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-drm.fr-en.html 17 Oct 2020 08:59:36 -0000
1.42
+++ proprietary/po/proprietary-drm.fr-en.html 10 Nov 2020 17:37:41 -0000
1.43
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
Please support our campaign
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary-drm.fr.po 17 Oct 2020 08:29:20 -0000
1.80
+++ proprietary/po/proprietary-drm.fr.po 10 Nov 2020 17:37:41 -0000
1.81
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -90,7 +90,7 @@
"conçues dans l'intention de restreindre ce que les utilisateurs peuvent "
"faire. Ces fonctionnalités sont aussi appelées <em>menottes
numériques</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-drm.it-diff.html 17 Oct 2020 08:05:08 -0000
1.45
+++ proprietary/po/proprietary-drm.it-diff.html 10 Nov 2020 17:37:41 -0000
1.46
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -83,7 +83,7 @@
<span class="removed"><del><strong><ul>
<li><p>The</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -521,7 +521,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-drm.it.po 17 Oct 2020 08:05:08 -0000
1.62
+++ proprietary/po/proprietary-drm.it.po 10 Nov 2020 17:37:41 -0000
1.63
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-12-30 14:17+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -130,7 +130,7 @@
"gli utenti. Queste funzionalità vengono anche chiamate <em>manette
digitali</"
"em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-drm.ja-diff.html 17 Oct 2020 08:05:08 -0000
1.48
+++ proprietary/po/proprietary-drm.ja-diff.html 10 Nov 2020 17:37:41 -0000
1.49
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -80,7 +80,7 @@
Please support our campaign
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -512,7 +512,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-drm.ja.po 17 Oct 2020 08:05:08 -0000
1.60
+++ proprietary/po/proprietary-drm.ja.po 10 Nov 2020 17:37:42 -0000
1.61
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:55+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -111,7 +111,7 @@
"(DRM)ãå®è£
ãã¦ããä¾ã§ã:
ã¦ã¼ã¶ãã§ãããã¨ãæå³çã«å¶éããããã«è¨è¨ãã"
"ãæ©è½ã§ãããã®æ©è½ã¯ã<em>ãã£ã¸ã¿ã«æé
</em>ã¨ãå¼ã°ãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-drm.pot 17 Oct 2020 08:05:08 -0000 1.40
+++ proprietary/po/proprietary-drm.pot 10 Nov 2020 17:37:42 -0000 1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -76,7 +76,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a "
"href=\"http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management\">
"
Index: proprietary/po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-drm.ru-en.html 19 Oct 2020 10:00:05 -0000
1.44
+++ proprietary/po/proprietary-drm.ru-en.html 10 Nov 2020 17:37:42 -0000
1.45
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -66,7 +66,7 @@
Please support our campaign
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -415,7 +415,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/po/proprietary-drm.ru.po 19 Oct 2020 10:00:05 -0000
1.101
+++ proprietary/po/proprietary-drm.ru.po 10 Nov 2020 17:37:42 -0000
1.102
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -91,7 +91,7 @@
"огÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо могÑÑ Ð´ÐµÐ»Ð°ÑÑ
полÑзоваÑели. ÐÑи ÑÑнкÑии назÑваÑÑÑÑ "
"Ñакже <em>ÑиÑÑовÑми наÑÑÑниками</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
Index: proprietary/po/proprietary-fraud.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.es-en.html 24 Jun 2020 05:37:11 -0000
1.4
+++ proprietary/po/proprietary-fraud.es-en.html 10 Nov 2020 17:37:42 -0000
1.5
@@ -52,10 +52,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are some examples of proprietary software that defrauds
users—taking their money by trickery.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-fraud.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-fraud.es.po 24 Jun 2020 05:37:11 -0000
1.9
+++ proprietary/po/proprietary-fraud.es.po 10 Nov 2020 17:37:42 -0000
1.10
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-20 13:17+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
Index: proprietary/po/proprietary-fraud.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.fr-en.html 24 Jun 2020 05:37:11 -0000
1.4
+++ proprietary/po/proprietary-fraud.fr-en.html 10 Nov 2020 17:37:42 -0000
1.5
@@ -52,10 +52,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are some examples of proprietary software that defrauds
users—taking their money by trickery.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-fraud.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.fr.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-fraud.fr.po 5 Oct 2020 13:13:25 -0000
1.7
+++ proprietary/po/proprietary-fraud.fr.po 10 Nov 2020 17:37:42 -0000
1.8
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
"Language-Team: French <trad-gnu@apri.org>\n"
@@ -76,7 +76,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
Index: proprietary/po/proprietary-fraud.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.pot,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.pot 24 Jun 2020 05:37:11 -0000
1.4
+++ proprietary/po/proprietary-fraud.pot 10 Nov 2020 17:37:42 -0000
1.5
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-fraud.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds "
"users—taking their money by trickery."
Index: proprietary/po/proprietary-fraud.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-fraud.ru-en.html 24 Jun 2020 05:37:11 -0000
1.4
+++ proprietary/po/proprietary-fraud.ru-en.html 10 Nov 2020 17:37:42 -0000
1.5
@@ -52,10 +52,10 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Here are some examples of proprietary software that defrauds
users—taking their money by trickery.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -141,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-fraud.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.ru.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-fraud.ru.po 24 Jun 2020 05:04:03 -0000
1.6
+++ proprietary/po/proprietary-fraud.ru.po 10 Nov 2020 17:37:42 -0000
1.7
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
Index: proprietary/po/proprietary-incompatibility.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-incompatibility.es-en.html 24 Jun 2020
05:37:11 -0000 1.4
+++ proprietary/po/proprietary-incompatibility.es-en.html 10 Nov 2020
17:37:42 -0000 1.5
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One of these malicious functionalities is the deliberate
incompatibility of a program with third party software that operates on
the same data types.</p>
@@ -78,7 +78,7 @@
artificial restrictions</a> on the interoperability of their products to
monopolize the market, and this is often achieved through proprietary
malware.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-incompatibility.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.es.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-incompatibility.es.po 24 Jun 2020 05:37:11
-0000 1.10
+++ proprietary/po/proprietary-incompatibility.es.po 10 Nov 2020 17:37:42
-0000 1.11
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-20 13:22+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -90,7 +90,7 @@
"Una de estas funcionalidades maliciosas es la intencionada incompatibilidad "
"de un programa con software de terceros que opera con el mismo tipo de datos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -102,7 +102,7 @@
"algún otro programa, y en particular, instalar software libre que pudiera "
"liberar el dispositivo en el que se ejecuta ese software."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -114,7 +114,7 @@
"datos antiguos se volverá muy complicado si se deja de mantener el software "
"privativo que puede leerlos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -126,7 +126,7 @@
"sistema sea tan engorrosa o lenta que resulte impracticable, a menos que se "
"trate de una pequeña cantidad de datos."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
Index: proprietary/po/proprietary-incompatibility.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-incompatibility.fr-en.html 24 Jun 2020
05:37:11 -0000 1.17
+++ proprietary/po/proprietary-incompatibility.fr-en.html 10 Nov 2020
17:37:42 -0000 1.18
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One of these malicious functionalities is the deliberate
incompatibility of a program with third party software that operates on
the same data types.</p>
@@ -78,7 +78,7 @@
artificial restrictions</a> on the interoperability of their products to
monopolize the market, and this is often achieved through proprietary
malware.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-incompatibility.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-incompatibility.fr.po 5 Oct 2020 13:13:25
-0000 1.26
+++ proprietary/po/proprietary-incompatibility.fr.po 10 Nov 2020 17:37:42
-0000 1.27
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -84,7 +84,7 @@
"L'une de ces fonctionnalités malveillantes est l'incompatibilité
délibérée "
"d'un programme avec d'autres logiciels qui utilisent le même type de
données."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -97,7 +97,7 @@
"programme libre, qui permettrait de libérer l'appareil sur lequel tourne le "
"logiciel."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -109,7 +109,7 @@
"récupération de données anciennes sera très difficile si le logiciel "
"privateur qui peut les lire n'est plus pris en charge."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -121,7 +121,7 @@
"système, si compliquée ou si lente qu'elle n'est pas faisable pour une "
"quantité significative de données."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
Index: proprietary/po/proprietary-incompatibility.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-incompatibility.pot 24 Jun 2020 05:37:11
-0000 1.12
+++ proprietary/po/proprietary-incompatibility.pot 10 Nov 2020 17:37:42
-0000 1.13
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-incompatibility.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,13 +68,13 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -82,7 +82,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -90,7 +90,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -98,7 +98,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a "
"href=\"https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies\">
"
Index: proprietary/po/proprietary-incompatibility.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-incompatibility.ru-en.html 24 Jun 2020
05:37:11 -0000 1.17
+++ proprietary/po/proprietary-incompatibility.ru-en.html 10 Nov 2020
17:37:42 -0000 1.18
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One of these malicious functionalities is the deliberate
incompatibility of a program with third party software that operates on
the same data types.</p>
@@ -78,7 +78,7 @@
artificial restrictions</a> on the interoperability of their products to
monopolize the market, and this is often achieved through proprietary
malware.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -182,7 +182,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-incompatibility.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-incompatibility.ru.po 24 Jun 2020 05:04:03
-0000 1.31
+++ proprietary/po/proprietary-incompatibility.ru.po 10 Nov 2020 17:37:42
-0000 1.32
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -88,7 +88,7 @@
"пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¿ÑогÑаммами ÑÑеÑÑиÑ
ÑÑоÑон,
коÑоÑÑе ÑабоÑаÑÑ Ñ Ñеми же Ñипами "
"даннÑÑ
."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -101,7 +101,7 @@
"ÑвободнÑе пÑогÑаммÑ, коÑоÑÑе могÑÑ
оÑвободиÑÑ ÑÑÑÑойÑÑво, на коÑоÑом "
"ÑабоÑаÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -113,7 +113,7 @@
"даннÑÑ
ÑÑÐ°Ð½ÐµÑ Ð²ÐµÑÑма заÑÑÑдниÑелÑнÑм,
еÑли поддеÑжка неÑвободнÑÑ
пÑогÑамм, "
"коÑоÑÑе могÑÑ Ð¸Ñ
ÑиÑаÑÑ, пÑекÑаÑиÑÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -125,7 +125,7 @@
"заÑÑÑднÑеÑÑÑ Ð¸Ð»Ð¸ замедлÑеÑÑÑ, ÑÑо ее
можно пÑовеÑÑи ÑолÑко над неболÑÑим "
"колиÑеÑÑвом даннÑÑ
."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-insecurity.de-diff.html 17 Oct 2020 08:05:08
-0000 1.43
+++ proprietary/po/proprietary-insecurity.de-diff.html 10 Nov 2020 17:37:42
-0000 1.44
@@ -67,7 +67,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This</em></ins></span> page lists clearly established cases of
insecurity in
proprietary software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
@@ -91,7 +91,7 @@
introduce them deliberately. In any case, they keep</strong></del></span>
<span class="inserted"><ins><em>is that</em></ins></span> users <span
class="inserted"><ins><em>are</em></ins></span>
<em>helpless to fix any security problems that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -161,7 +161,7 @@
access</em></ins></span> the <span
class="removed"><del><strong>airbags</a>.</p>
</li>
<li>
- <p>A “smart” intravenous</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop on the
household
+ <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
@@ -309,8 +309,8 @@
</li>
<li id="M201709200">
- <p>A “smart” intravenous</em></ins></span> pump
- designed for hospitals is connected to the internet. Naturally <a
+ <p>A “smart” intravenous pump
+ designed</em></ins></span> for hospitals is connected to the internet.
Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
<span class="removed"><del><strong><p>Note</strong></del></span>
@@ -1136,7 +1136,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary/po/proprietary-insecurity.de.po 17 Oct 2020 08:05:08 -0000
1.146
+++ proprietary/po/proprietary-insecurity.de.po 10 Nov 2020 17:37:42 -0000
1.147
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -131,7 +131,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-insecurity.es-en.html 18 Oct 2020 09:59:20
-0000 1.14
+++ proprietary/po/proprietary-insecurity.es-en.html 10 Nov 2020 17:37:42
-0000 1.15
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
makes bugs more dangerous in proprietary software is that users are
<em>helpless to fix any security problems that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-insecurity.es.po 18 Oct 2020 09:51:17 -0000
1.39
+++ proprietary/po/proprietary-insecurity.es.po 10 Nov 2020 17:37:42 -0000
1.40
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-18 11:14+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -84,7 +84,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -99,7 +99,7 @@
"aquà para mostrar que el software privativo no es inmune a los fallos, y a "
"menudo es bastante chapucero."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-insecurity.fr-en.html 17 Oct 2020 08:59:36
-0000 1.91
+++ proprietary/po/proprietary-insecurity.fr-en.html 10 Nov 2020 17:37:42
-0000 1.92
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
makes bugs more dangerous in proprietary software is that users are
<em>helpless to fix any security problems that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary-insecurity.fr.po 17 Oct 2020 08:29:20 -0000
1.200
+++ proprietary/po/proprietary-insecurity.fr.po 10 Nov 2020 17:37:42 -0000
1.201
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -80,7 +80,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -96,7 +96,7 @@
"logiciel privateur n'est pas exempt de bogues et qu'il est souvent tout à "
"fait bâclé."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-insecurity.it-diff.html 17 Oct 2020 08:05:08
-0000 1.58
+++ proprietary/po/proprietary-insecurity.it-diff.html 10 Nov 2020 17:37:42
-0000 1.59
@@ -67,7 +67,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This</em></ins></span> page lists clearly established cases of
insecurity in
proprietary software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
@@ -97,7 +97,7 @@
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>break security on a “smart”
TV</a> and use its camera</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
@@ -135,29 +135,30 @@
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
A disasterous security bug</a> touches millions</em></ins></span> of
<span class="removed"><del><strong>HP laptops logged the user's
- keystroke to a file</strong></del></span> <span
class="inserted"><ins><em>products</em></ins></span> in the <span
class="removed"><del><strong>filesystem. Any process with access
to</strong></del></span>
+ keystroke to a file</strong></del></span> <span
class="inserted"><ins><em>products</em></ins></span> in the <span
class="removed"><del><strong>filesystem. Any process with access to
+ the filesystem or</strong></del></span>
<span class="inserted"><ins><em>Internet of Stings.</p>
- <p>As a result, anyone can sting</em></ins></span> the <span
class="removed"><del><strong>filesystem or</strong></del></span> <span
class="inserted"><ins><em>user, not only</em></ins></span> the <span
class="removed"><del><strong>MapViewOfFile API could gain
access</strong></del></span>
+ <p>As a result, anyone can sting</em></ins></span> the <span
class="removed"><del><strong>MapViewOfFile API could gain access
to</strong></del></span> <span class="inserted"><ins><em>user, not
only</em></ins></span> the
+ <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>manufacturer.</p>
</li>
<li id="M201912170">
- <p>Some security breakers (wrongly referred in this article as <a
-
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed</em></ins></span> to <span
class="inserted"><ins><em>interfere</em></ins></span> the
- <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>Amazon Ring proprietary system,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
+ <p>Some security breakers (wrongly referred in this article
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
+ managed</em></ins></span> to <span
class="removed"><del><strong>modzero</a></strong></del></span> <span
class="inserted"><ins><em>interfere</em></ins></span> the <span
class="removed"><del><strong>“information-leak via Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>Amazon Ring proprietary system, and <a
+
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>modzero</a></strong></del></span> <span
class="inserted"><ins><em><a
+ a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>capture keystrokes without
+ taking</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span
class="removed"><del><strong>“information-leak via Covert Storage
- Channel enables malware authors to capture keystrokes without
- taking</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>household
+ access</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop on the
household
through connected surveillance devices.</p>
<p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>being classified as malicious
task</strong></del></span> <span class="inserted"><ins><em>the wifi password
would not be sufficient to carry
@@ -1094,7 +1095,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary-insecurity.it.po 17 Oct 2020 08:05:08 -0000
1.163
+++ proprietary/po/proprietary-insecurity.it.po 10 Nov 2020 17:37:42 -0000
1.164
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -118,7 +118,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -127,7 +127,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/proprietary-insecurity.ja-diff.html 17 Oct 2020 08:05:08
-0000 1.79
+++ proprietary/po/proprietary-insecurity.ja-diff.html 10 Nov 2020 17:37:42
-0000 1.80
@@ -67,7 +67,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This</em></ins></span> page lists clearly established cases of
insecurity in
proprietary software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
@@ -91,7 +91,7 @@
<li>
<p>4G LTE phone networks are drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>any security problems
that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to</em></ins></span> be
@@ -163,7 +163,7 @@
<span class="inserted"><ins><em><li id="M201911190">
<p>Internet-tethered Amazon Ring had</em></ins></span>
- a <span class="removed"><del><strong>proprietary ASN.1 library,
used</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to <a
+ a <span class="removed"><del><strong>proprietary ASN.1 library, used in
cell</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
@@ -521,8 +521,8 @@
</li>
<li id="M201607190">
- <p>A bug in a proprietary ASN.1 library, used</em></ins></span>
- in cell phone towers as well as cell phones and routers, <a
+ <p>A bug in a proprietary ASN.1 library, used
+ in cell</em></ins></span> phone towers as well as cell phones and routers,
<a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
</li>
@@ -1037,7 +1037,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary-insecurity.ja.po 17 Oct 2020 08:05:08 -0000
1.136
+++ proprietary/po/proprietary-insecurity.ja.po 10 Nov 2020 17:37:42 -0000
1.137
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -109,7 +109,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-insecurity.pot 17 Oct 2020 08:05:08 -0000
1.102
+++ proprietary/po/proprietary-insecurity.pot 10 Nov 2020 17:37:42 -0000
1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -77,7 +77,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-insecurity.ru-en.html 19 Oct 2020 10:00:05
-0000 1.90
+++ proprietary/po/proprietary-insecurity.ru-en.html 10 Nov 2020 17:37:42
-0000 1.91
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
noteworthy. Even though most of these security flaws are unintentional,
@@ -65,7 +65,7 @@
makes bugs more dangerous in proprietary software is that users are
<em>helpless to fix any security problems that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -789,7 +789,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/proprietary-insecurity.ru.po 19 Oct 2020 10:00:05 -0000
1.252
+++ proprietary/po/proprietary-insecurity.ru.po 10 Nov 2020 17:37:42 -0000
1.253
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -94,7 +94,7 @@
"ÑообÑаем о ниÑ
, ÑÑÐ¾Ð±Ñ Ð¿Ð¾ÐºÐ°Ð·Ð°ÑÑ, ÑÑо
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ иÑклÑÑаÑÑ "
"оÑибки, и ÑаÑÑо веÑÑма гÑÑбÑе."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
Index: proprietary/po/proprietary-interference.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-interference.de-diff.html 17 Oct 2020
08:05:08 -0000 1.32
+++ proprietary/po/proprietary-interference.de-diff.html 10 Nov 2020
17:37:42 -0000 1.33
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality mediates developer's interference
into the use of the software.</em></ins></span> This page describes how
various proprietary
programs <span class="removed"><del><strong>mess up</strong></del></span>
<span class="inserted"><ins><em>harass or annoy</em></ins></span> the
@@ -77,7 +77,7 @@
word <span class="removed"><del><strong>“sabotage”. Nonetheless,
they are nasty and
wrong.</strong></del></span> <span
class="inserted"><ins><em>“sabotage” is too strong for
them.</em></ins></span>
</p>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -96,10 +96,7 @@
universal remote back door</a>. Tesla used it to <a
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li><p>Pearson's</strong></del></span> <span
class="inserted"><ins><em>features.</p>
+ extra for re-enabling the features.</p>
<p>This kind of malfeature is only possible with proprietary
software—free software is controlled by its users who wouldn't
@@ -109,7 +106,10 @@
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
+ managed to interfere</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li><p>Pearson's</strong></del></span> <span
class="inserted"><ins><em>Amazon Ring proprietary system, and <a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
@@ -410,7 +410,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:08 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-interference.de.po 17 Oct 2020 08:05:08
-0000 1.70
+++ proprietary/po/proprietary-interference.de.po 10 Nov 2020 17:37:42
-0000 1.71
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | {+One kind of malicious functionality mediates developer's interference
# | into the use of the software.+} This page describes how various
# | proprietary programs [-mess up-] {+harass or annoy the user, or cause
Index: proprietary/po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-interference.es-en.html 18 Oct 2020 09:59:20
-0000 1.8
+++ proprietary/po/proprietary-interference.es-en.html 10 Nov 2020 17:37:42
-0000 1.9
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality mediates developer's interference
into the use of the software. This page describes how various proprietary
programs harass or annoy the user, or cause trouble for the user. These
@@ -60,7 +60,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
word “sabotage” is too strong for them.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-interference.es.po 18 Oct 2020 09:59:20
-0000 1.23
+++ proprietary/po/proprietary-interference.es.po 10 Nov 2020 17:37:42
-0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-18 11:14+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -81,7 +81,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
Index: proprietary/po/proprietary-interference.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.fr-en.html 17 Oct 2020 08:59:36
-0000 1.45
+++ proprietary/po/proprietary-interference.fr-en.html 10 Nov 2020 17:37:42
-0000 1.46
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality mediates developer's interference
into the use of the software. This page describes how various proprietary
programs harass or annoy the user, or cause trouble for the user. These
@@ -60,7 +60,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
word “sabotage” is too strong for them.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary-interference.fr.po 17 Oct 2020 08:29:20
-0000 1.95
+++ proprietary/po/proprietary-interference.fr.po 10 Nov 2020 17:37:42
-0000 1.96
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -76,7 +76,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
Index: proprietary/po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-interference.ja-diff.html 17 Oct 2020
08:05:09 -0000 1.44
+++ proprietary/po/proprietary-interference.ja-diff.html 10 Nov 2020
17:37:42 -0000 1.45
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality mediates developer's interference
into the use of the software.</em></ins></span> This page describes how
various proprietary
programs <span class="removed"><del><strong>mess up</strong></del></span>
<span class="inserted"><ins><em>harass or annoy</em></ins></span> the
@@ -75,7 +75,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotage</a>,</em></ins></span>
but <span class="removed"><del><strong>they are not grave
enough</strong></del></span> <span class="inserted"><ins><em>the
word “sabotage” is too strong for them.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
@@ -394,7 +394,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/proprietary-interference.ja.po 17 Oct 2020 08:05:09
-0000 1.67
+++ proprietary/po/proprietary-interference.ja.po 10 Nov 2020 17:37:42
-0000 1.68
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:53+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "This page describes how various proprietary programs mess up the user's "
Index: proprietary/po/proprietary-interference.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.pot,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.pot 17 Oct 2020 08:05:09 -0000
1.45
+++ proprietary/po/proprietary-interference.pot 10 Nov 2020 17:37:42 -0000
1.46
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
Index: proprietary/po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-interference.ru-en.html 19 Oct 2020 10:00:05
-0000 1.45
+++ proprietary/po/proprietary-interference.ru-en.html 10 Nov 2020 17:37:42
-0000 1.46
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>One kind of malicious functionality mediates developer's interference
into the use of the software. This page describes how various proprietary
programs harass or annoy the user, or cause trouble for the user. These
@@ -60,7 +60,7 @@
href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
word “sabotage” is too strong for them.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -329,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary-interference.ru.po 19 Oct 2020 10:00:05
-0000 1.114
+++ proprietary/po/proprietary-interference.ru.po 10 Nov 2020 17:37:42
-0000 1.115
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-jails.de-diff.html 7 Nov 2020 10:01:57
-0000 1.37
+++ proprietary/po/proprietary-jails.de-diff.html 10 Nov 2020 17:37:42
-0000 1.38
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious</em></ins></span> operating
systems that are
<span class="removed"><del><strong><em>jails</em>: they
are</strong></del></span>
designed to impose censorship of which applications the user can install.
@@ -91,7 +91,7 @@
<span class="inserted"><ins><em><p>This page lists a few jails, along
with some of the methods they use
to censor apps, and includes specific examples of apps that were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -197,22 +197,22 @@
<p>Thus, not only does Apple use the App Store as an instrument
of censorship, it also uses the iThing operating system for that
- purpose.</p></em></ins></span>
+ purpose.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905150">
+ <li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats as well.</p>
+ inexcusable even if it didn't lead to security threats as
well.</p></em></ins></span>
</li>
- <li id="M201710130"></em></ins></span>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201710130"></em></ins></span>
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
censoring apps for the US government too</a>. Specifically, it is
@@ -444,7 +444,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:57 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/po/proprietary-jails.de.po 7 Nov 2020 10:01:57 -0000
1.65
+++ proprietary/po/proprietary-jails.de.po 10 Nov 2020 17:37:42 -0000
1.66
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here-]{+The “jails”+} are [-examples of proprietary-]
# | {+malicious+} operating systems that [-are <em>jails</em>: they-] are
# | designed to impose censorship of which applications the user can install.
@@ -144,7 +144,7 @@
"ZRViDum.jpg\">Bild eines iGefängnisses</a> , <cite><q>Your device is your "
"prison. Go outside.</q></cite>, illustriert dies."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -155,7 +155,7 @@
"Unternehmen zu verkaufen, um Zensur zu verhängen, sollte per Gesetz verboten
"
"sein ‑ ist es aber nicht."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-jails.es-en.html 8 Nov 2020 10:29:08 -0000
1.35
+++ proprietary/po/proprietary-jails.es-en.html 10 Nov 2020 17:37:42 -0000
1.36
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious operating systems that are
designed to impose censorship of which applications the user can install.
The <a href="http://i.imgur.com/ZRViDum.jpg">image of the iPrison</a>
@@ -68,7 +68,7 @@
<p>This page lists a few jails, along with some of the methods they use
to censor apps, and includes specific examples of apps that were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/proprietary-jails.es.po 8 Nov 2020 10:17:18 -0000
1.75
+++ proprietary/po/proprietary-jails.es.po 10 Nov 2020 17:37:42 -0000
1.76
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-08 11:14+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -95,7 +95,7 @@
"href=\"http://i.imgur.com/ZRViDum.jpg\">imagen de una iPrisión</a> ilustra "
"el problema."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -106,7 +106,7 @@
"para que una empresa imponga la censura deberÃa estar prohibida por la ley, "
"pero no lo está."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-jails.fr-en.html 7 Nov 2020 13:01:46 -0000
1.39
+++ proprietary/po/proprietary-jails.fr-en.html 10 Nov 2020 17:37:42 -0000
1.40
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious operating systems that are
designed to impose censorship of which applications the user can install.
The <a href="http://i.imgur.com/ZRViDum.jpg">image of the iPrison</a>
@@ -68,7 +68,7 @@
<p>This page lists a few jails, along with some of the methods they use
to censor apps, and includes specific examples of apps that were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 13:01:46 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/proprietary-jails.fr.po 7 Nov 2020 12:26:44 -0000
1.82
+++ proprietary/po/proprietary-jails.fr.po 10 Nov 2020 17:37:42 -0000
1.83
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-07 13:25+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -90,7 +90,7 @@
"\"http://i.imgur.com/ZRViDum.jpg\">image de l'iPrison</a> illustre ce "
"problème."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -101,7 +101,7 @@
"servant à une société pour imposer la censure devrait être interdit par
la "
"loi, mais ce n'est pas le cas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-jails.it-diff.html 7 Nov 2020 10:01:57
-0000 1.44
+++ proprietary/po/proprietary-jails.it-diff.html 10 Nov 2020 17:37:42
-0000 1.45
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious operating</em></ins></span>
systems that are
<span class="removed"><del><strong><em>jails</em>: they do not
allow</strong></del></span>
<span class="inserted"><ins><em>designed to impose censorship of which
applications</em></ins></span> the user <span class="removed"><del><strong>to
freely install
@@ -94,7 +94,7 @@
<span class="inserted"><ins><em><p>This page lists a few jails, along
with some of the methods they use</em></ins></span>
to <span class="removed"><del><strong>strengthen</strong></del></span> <span
class="inserted"><ins><em>censor apps, and includes specific examples of
apps</em></ins></span> that <span class="inserted"><ins><em>were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in this page but isn't
@@ -159,14 +159,18 @@
<span
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC">part</em></ins></span>
of
- the <span class="removed"><del><strong>LinkedIn app in
Russia</a>.</p>
+ the <span class="removed"><del><strong>LinkedIn</strong></del></span>
<span class="inserted"><ins><em>operating system</a>), but Apple could
change that policy step
+ by step. Or perhaps Apple will define malware to include
any</em></ins></span> app <span class="removed"><del><strong>in
Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system
itself. While subjecting its users to its own surveillance, it tries
-to protect its users from Russian surveillance, and is therefore
-subject to Russian censorship.</p>
+to protect its</strong></del></span>
+ <span class="inserted"><ins><em>that China does not like.</p>
+
+ <p>For free software, this means</em></ins></span> users <span
class="removed"><del><strong>from Russian surveillance, and is therefore
+subject</strong></del></span> <span class="inserted"><ins><em>will
need</em></ins></span> to <span class="removed"><del><strong>Russian
censorship.</p>
-<p>However, the point here is the wrong of Apple's censorship of
+<p>However, the point here is the wrong of</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> Apple's <span
class="removed"><del><strong>censorship of
apps.</p>
</li>
@@ -189,20 +193,21 @@
committed the enormity of disassembling some iThings.
</p></li>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>operating system</a>), but</em></ins></span>
Apple <span class="removed"><del><strong>rejected an app</strong></del></span>
<span class="inserted"><ins><em>could change</em></ins></span> that <span
class="removed"><del><strong>displayed the locations of US drone
+<li><p>
+Apple rejected an app that displayed the locations of US drone
assassinations, giving various excuses. Each time the developers
fixed one “problem”, Apple complained about another.
-After the fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>policy step
- by step. Or perhaps</em></ins></span> Apple <span
class="removed"><del><strong><a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
-it was censoring the</strong></del></span> <span
class="inserted"><ins><em>will define malware to include any</em></ins></span>
app <span class="removed"><del><strong>based on the subject matter</a>.
+After the fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on the subject matter</a>.
</p></li>
<li><p>
As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights or would help women find abortions</a>.</p>
-<p>
-This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+<p></strong></del></span>
+ <span class="inserted"><ins><em>approval after
compilation.</em></ins></span> This <span
class="removed"><del><strong>particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
affects other Apple services</a>.
</p></li>
@@ -210,15 +215,11 @@
<a
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">Google
censored installation of Samsung's ad-blocker,</a> saying that
-blocking ads is “interference” with the sites</strong></del></span>
- that
-<span class="removed"><del><strong>advertise (and surveil users through
ads).</p>
-
-<p>The ad-blocker is proprietary</strong></del></span> <span
class="inserted"><ins><em>China does not like.</p>
-
- <p>For free</em></ins></span> software, <span
class="removed"><del><strong>just like the program (Google
-Play) that Google used</strong></del></span> <span
class="inserted"><ins><em>this means users will need</em></ins></span> to <span
class="removed"><del><strong>deny access</strong></del></span> <span
class="inserted"><ins><em>get Apple's
- approval after compilation. This amounts</em></ins></span> to <span
class="removed"><del><strong>install it. Using</strong></del></span> a <span
class="removed"><del><strong>nonfree program
+blocking ads is “interference” with the sites that
+advertise (and surveil users through ads).</p>
+
+<p>The ad-blocker is proprietary software, just like the program (Google
+Play) that Google used to deny access</strong></del></span> <span
class="inserted"><ins><em>amounts</em></ins></span> to <span
class="removed"><del><strong>install it. Using</strong></del></span> a <span
class="removed"><del><strong>nonfree program
gives</strong></del></span> <span class="inserted"><ins><em>system of
surveilling</em></ins></span>
the <span class="removed"><del><strong>owner power over you, and Google
has exercised that power.</p>
@@ -528,7 +529,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:57 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary-jails.it.po 7 Nov 2020 10:01:58 -0000
1.68
+++ proprietary/po/proprietary-jails.it.po 10 Nov 2020 17:37:42 -0000
1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:15+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Here-]{+The “jails”+} are [-examples of proprietary-]
# | {+malicious operating+} systems that are [-<em>jails</em>: they do not
# | allow-] {+designed to impose censorship of which applications+} the user
@@ -140,7 +140,7 @@
"\"http://i.imgur.com/ZRViDum.jpg\">immagine dell'iPrigione</a> illustra "
"questo problema."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -150,7 +150,7 @@
"possiede il sistema. Vendere prodotti progettati come piattaforme tramite "
"cui le società possono censurare dovrebbe essere illegale, ma non lo è."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-jails.ja-diff.html 7 Nov 2020 10:01:58
-0000 1.47
+++ proprietary/po/proprietary-jails.ja-diff.html 10 Nov 2020 17:37:42
-0000 1.48
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious operating</em></ins></span>
systems that are
<span class="removed"><del><strong><em>jails</em>: they do not
allow</strong></del></span>
<span class="inserted"><ins><em>designed to impose censorship of which
applications</em></ins></span> the user <span class="removed"><del><strong>to
freely install
@@ -86,7 +86,7 @@
<span class="inserted"><ins><em><p>This page lists a few jails, along
with some of the methods they use
to censor apps, and includes specific examples of apps that were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -431,7 +431,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:58 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-jails.ja.po 7 Nov 2020 10:01:58 -0000
1.58
+++ proprietary/po/proprietary-jails.ja.po 10 Nov 2020 17:37:42 -0000
1.59
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:28+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Here are examples of proprietary systems that are <em>jails</em>: they do "
@@ -116,7 +116,7 @@
"ãªã±ã¼ã·ã§ã³ãã¤ã³ã¹ãã¼ã«ãããã¨ãèªãã¾ããã<a
href=\"http://i.imgur.com/"
"ZRViDum.jpg\">iPrisonã®ç»å</a>ããã®åé¡ãæãã¦ãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -126,7 +126,7 @@
"ããä¸ã¤ã®ä¼ç¤¾ã®ãã©ãããã©ã¼ã
ã¨ãã¦ãæ¤é²ãå¼·å¶ããããã«è¨è¨ããã製åã"
"販売ããã®ã¯æ³å¾ã§ç¦æ¢ãããã¹ãã§ããããããªã£ã¦ãã¾ããã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-jails.pot 7 Nov 2020 10:01:58 -0000
1.40
+++ proprietary/po/proprietary-jails.pot 10 Nov 2020 17:37:42 -0000
1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a "
@@ -76,14 +76,14 @@
"this issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-jails.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/proprietary-jails.ru-en.html 7 Nov 2020 11:30:44 -0000
1.41
+++ proprietary/po/proprietary-jails.ru-en.html 10 Nov 2020 17:37:42 -0000
1.42
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>The “jails” are malicious operating systems that are
designed to impose censorship of which applications the user can install.
The <a href="http://i.imgur.com/ZRViDum.jpg">image of the iPrison</a>
@@ -68,7 +68,7 @@
<p>This page lists a few jails, along with some of the methods they use
to censor apps, and includes specific examples of apps that were blocked
using this censorship power.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary/po/proprietary-jails.ru.po 7 Nov 2020 11:30:44 -0000
1.101
+++ proprietary/po/proprietary-jails.ru.po 10 Nov 2020 17:37:42 -0000
1.102
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -91,7 +91,7 @@
"Ð¼Ð¾Ð¶ÐµÑ ÑÑÑанавливаÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ. <a
href=\"http://i.imgur.com/ZRViDum.jpg"
"\">ÐзобÑажение ай-ÑÑÑÑмÑ</a> иллÑÑÑÑиÑÑеÑ
ÑÑÑ Ð¿ÑоблемÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -101,7 +101,7 @@
"владеÑÑей ÑиÑÑемой. ÐÑодажа пÑодÑкÑов,
ÑпÑоекÑиÑованнÑÑ
как плаÑÑоÑÐ¼Ñ Ð´Ð»Ñ "
"Ð½Ð°Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹ ÑензÑÑÑ, должна бÑÑÑ
запÑеÑена законом."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
Index: proprietary/po/proprietary-manipulation.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-manipulation.es-en.html 24 Jun 2020 05:37:12
-0000 1.4
+++ proprietary/po/proprietary-manipulation.es-en.html 10 Nov 2020 17:37:42
-0000 1.5
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Manipulation of users is one of these malicious functionalities.
Here are examples of programs that are designed to do this by taking
advantage of human psychology.</p>
@@ -62,7 +62,7 @@
href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
which also take advantage of human psychology, but in a much more
elaborate and dangerous way.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-manipulation.es.po 24 Jun 2020 05:37:12
-0000 1.9
+++ proprietary/po/proprietary-manipulation.es.po 10 Nov 2020 17:37:42
-0000 1.10
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-21 12:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -92,7 +92,7 @@
"Aquà se presentan ejemplos de programas que se han diseñado para hacerlo "
"aprovechando caracterÃsticas de la psicologÃa humana."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
Index: proprietary/po/proprietary-manipulation.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-manipulation.fr-en.html 24 Jun 2020 05:37:12
-0000 1.6
+++ proprietary/po/proprietary-manipulation.fr-en.html 10 Nov 2020 17:37:42
-0000 1.7
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Manipulation of users is one of these malicious functionalities.
Here are examples of programs that are designed to do this by taking
advantage of human psychology.</p>
@@ -62,7 +62,7 @@
href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
which also take advantage of human psychology, but in a much more
elaborate and dangerous way.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-manipulation.fr.po 5 Oct 2020 13:13:25
-0000 1.10
+++ proprietary/po/proprietary-manipulation.fr.po 10 Nov 2020 17:37:42
-0000 1.11
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -87,7 +87,7 @@
"malveillantes. Voici des exemples de programmes qui sont conçus pour "
"exploiter la psychologie humaine à cette fin."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
Index: proprietary/po/proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-manipulation.pot 24 Jun 2020 05:37:12 -0000
1.6
+++ proprietary/po/proprietary-manipulation.pot 10 Nov 2020 17:37:42 -0000
1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,14 +68,14 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a "
"href=\"/proprietary/proprietary-addictions.html\">Addictive programs</a>, "
Index: proprietary/po/proprietary-manipulation.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-manipulation.ru-en.html 24 Jun 2020 05:37:12
-0000 1.5
+++ proprietary/po/proprietary-manipulation.ru-en.html 10 Nov 2020 17:37:42
-0000 1.6
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Manipulation of users is one of these malicious functionalities.
Here are examples of programs that are designed to do this by taking
advantage of human psychology.</p>
@@ -62,7 +62,7 @@
href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
which also take advantage of human psychology, but in a much more
elaborate and dangerous way.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -167,7 +167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-manipulation.ru.po 24 Jun 2020 05:04:03
-0000 1.9
+++ proprietary/po/proprietary-manipulation.ru.po 10 Nov 2020 17:37:42
-0000 1.10
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -89,7 +89,7 @@
"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð¿ÑогÑамм, ÑпÑоекÑиÑованнÑÑ
,
ÑÑÐ¾Ð±Ñ Ð´ÐµÐ»Ð°ÑÑ ÑÑо, опиÑаÑÑÑ Ð½Ð° "
"ÑеловеÑеÑкÑÑ Ð¿ÑиÑ
ологиÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
Index: proprietary/po/proprietary-obsolescence.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-obsolescence.es-en.html 24 Jun 2020 05:37:12
-0000 1.7
+++ proprietary/po/proprietary-obsolescence.es-en.html 10 Nov 2020 17:37:42
-0000 1.8
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Programmed obsolescence is one of the malicious functionalities that
may be designed into proprietary software.</p>
@@ -64,7 +64,7 @@
<p>Here are examples of proprietary programs that make hardware devices
prematurely obsolete.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-obsolescence.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-obsolescence.es.po 24 Jun 2020 05:37:12
-0000 1.15
+++ proprietary/po/proprietary-obsolescence.es.po 10 Nov 2020 17:37:42
-0000 1.16
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-24 12:20+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
@@ -91,7 +91,7 @@
"La obsolescencia programada es una de las funcionalidades maliciosas que "
"pueden diseñarse en el software privativo."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -104,7 +104,7 @@
"tiempo, al dejar de recibir mantenimiento, o bien a desechar equipos que "
"podrÃan haberse reparado."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
Index: proprietary/po/proprietary-obsolescence.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-obsolescence.fr-en.html 24 Jun 2020 05:37:12
-0000 1.8
+++ proprietary/po/proprietary-obsolescence.fr-en.html 10 Nov 2020 17:37:42
-0000 1.9
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Programmed obsolescence is one of the malicious functionalities that
may be designed into proprietary software.</p>
@@ -64,7 +64,7 @@
<p>Here are examples of proprietary programs that make hardware devices
prematurely obsolete.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-obsolescence.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary-obsolescence.fr.po 5 Oct 2020 13:13:25
-0000 1.19
+++ proprietary/po/proprietary-obsolescence.fr.po 10 Nov 2020 17:37:42
-0000 1.20
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2019-11-23 17:20+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
"Language-Team: French <trad-gnu@apri.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
@@ -85,7 +85,7 @@
"L'obsolescence programmée est l'une des fonctionnalités malveillantes qui "
"peuvent être intégrées au logiciel privateur."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -99,7 +99,7 @@
"fabricant, ou à jeter des composant défectueux qui auraient pu être faits "
"pour être réparables."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
Index: proprietary/po/proprietary-obsolescence.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.pot,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-obsolescence.pot 24 Jun 2020 05:37:12 -0000
1.8
+++ proprietary/po/proprietary-obsolescence.pot 10 Nov 2020 17:37:42 -0000
1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,13 +68,13 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -82,7 +82,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
Index: proprietary/po/proprietary-obsolescence.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-obsolescence.ru-en.html 24 Jun 2020 05:37:12
-0000 1.7
+++ proprietary/po/proprietary-obsolescence.ru-en.html 10 Nov 2020 17:37:42
-0000 1.8
@@ -52,7 +52,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Programmed obsolescence is one of the malicious functionalities that
may be designed into proprietary software.</p>
@@ -64,7 +64,7 @@
<p>Here are examples of proprietary programs that make hardware devices
prematurely obsolete.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -210,7 +210,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:12 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-obsolescence.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-obsolescence.ru.po 24 Jun 2020 05:04:03
-0000 1.14
+++ proprietary/po/proprietary-obsolescence.ru.po 10 Nov 2020 17:37:42
-0000 1.15
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
@@ -87,7 +87,7 @@
"ÐапÑогÑаммиÑованное
ÑÑÑаÑевание —одна из вÑедоноÑнÑÑ
ÑÑнкÑий, "
"коÑоÑÑе могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð²
неÑвободнÑе пÑогÑаммÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -101,7 +101,7 @@
"пÑиÑ
одиÑÑÑ Ð²ÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ
аппаÑаÑÑÑÑ, коÑоÑÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ бÑло Ð±Ñ "
"поÑиниÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-sabotage.de-diff.html 7 Nov 2020 10:01:59
-0000 1.60
+++ proprietary/po/proprietary-sabotage.de-diff.html 10 Nov 2020 17:37:42
-0000 1.61
@@ -66,11 +66,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations are listed
below.</p>
-</div>
+</blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -897,7 +897,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:59 $
+$Date: 2020/11/10 17:37:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/proprietary-sabotage.de.po 7 Nov 2020 10:01:59 -0000
1.142
+++ proprietary/po/proprietary-sabotage.de.po 10 Nov 2020 17:37:43 -0000
1.143
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-sabotage.es-en.html 8 Nov 2020 10:29:08
-0000 1.20
+++ proprietary/po/proprietary-sabotage.es-en.html 10 Nov 2020 17:37:43
-0000 1.21
@@ -52,11 +52,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/08 10:29:08 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-sabotage.es.po 8 Nov 2020 10:17:18 -0000
1.46
+++ proprietary/po/proprietary-sabotage.es.po 10 Nov 2020 17:37:43 -0000
1.47
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-08 11:15+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-sabotage.fr-en.html 7 Nov 2020 13:01:46
-0000 1.90
+++ proprietary/po/proprietary-sabotage.fr-en.html 10 Nov 2020 17:37:43
-0000 1.91
@@ -52,11 +52,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 13:01:46 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary/po/proprietary-sabotage.fr.po 7 Nov 2020 12:26:44 -0000
1.193
+++ proprietary/po/proprietary-sabotage.fr.po 10 Nov 2020 17:37:43 -0000
1.194
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-07 13:25+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-sabotage.it-diff.html 7 Nov 2020 10:01:59
-0000 1.70
+++ proprietary/po/proprietary-sabotage.it-diff.html 10 Nov 2020 17:37:43
-0000 1.71
@@ -68,22 +68,17 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations</em></ins></span> are
<span class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>listed below.</p>
-</div>
+</blockquote>
<div class="important">
-<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary software</strong></del></span> <span
class="inserted"><ins><em>an example</em></ins></span> that <span
class="removed"><del><strong>has something
-worse than</strong></del></span> <span class="inserted"><ins><em>ought to be
in this page but isn't
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary software</strong></del></span> <span
class="inserted"><ins><em>an example</em></ins></span> that <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>back door.</p>
-
-<ul>
- <li>
- <p>Apple</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -93,20 +88,16 @@
<li id="M202008182">
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This</em></ins></span>
will <span class="removed"><del><strong>stop</strong></del></span> <span
class="inserted"><ins><em>give Facebook
+ users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
</li>
<li id="M202007270">
<p>The Mellow sous-vide cooker is
- tethered to a server. The company suddenly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
- model iThings</a>.</p>
-
- <p>Meanwhile, Apple stops people</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding
users</em></ins></span> from <span class="removed"><del><strong>fixing problems
themselves;
- that's</strong></del></span>
- <span class="inserted"><ins><em>taking advantage of</em></ins></span> the
<span class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>“advanced features”</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the cooker
+ tethered to a server. The company suddenly <a
+
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
+ turned this tethering into a subscription</a>, forbidding users from
+ taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
@@ -117,13 +108,12 @@
snooping and sabotage capabilities</a> if they install their own
software on the device. Many employers demand to do this. For the
employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree</em></ins></span> software.</p>
+ and as dangerous as any other nonfree software.</p>
</li>
- <span class="removed"><del><strong><li><p>
Microsoft</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910071">
- <p>Adobe has <a
+ <li id="M201910071">
+ <p>Adobe</em></ins></span> has <span
class="removed"><del><strong>something
+worse</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">
cancelled the software subscriptions of all users in
Venezuela</a>. This demonstrates how a requirement for subscription
can be
@@ -133,21 +123,29 @@
<li id="M201909160">
<p>Tesla users claim Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
- software to cut down on battery range</a>, rather than replace the
+ software to cut down on battery range</a>, rather</em></ins></span>
than <span class="inserted"><ins><em>replace the
defective batteries. Tesla did this to avoid having to run their
warranty.</p>
- <p>This means that proprietary software can potentially be a way to
+ <p>This means that proprietary software can potentially
be</em></ins></span> a <span class="removed"><del><strong>back door.</p>
+
+<ul>
+ <li>
+ <p>Apple will stop</strong></del></span> <span
class="inserted"><ins><em>way to
commit perjury with impunity.</p>
</li>
<li id="M201908130">
<p>When Apple suspects a user of fraud, it
judges the case secretly and presents the verdict
- as a fait accompli. The punishment to a user found guilty <a
-
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples the user's Apple
- devices forever</a>. There is no appeal.</p>
+ as a fait accompli. The punishment to a user found
guilty</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
+ being cut off</em></ins></span> for <span
class="removed"><del><strong>older
+ model iThings</a>.</p>
+
+ <p>Meanwhile,</strong></del></span> <span
class="inserted"><ins><em>life, which more-or-less cripples the
user's</em></ins></span> Apple <span class="removed"><del><strong>stops people
from fixing problems themselves;
+ that's</strong></del></span>
+ <span class="inserted"><ins><em>devices forever</a>. There is no
appeal.</p>
</li>
<li id="M201904041">
@@ -158,9 +156,9 @@
versions of Windows 10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909">
tampering with users' settings and files</a>, notably to
- “repair” any components of the updating system that users
+ “repair” any components of</em></ins></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>updating system that users
may have intentionally disabled, and thus regain full power over
- them. Microsoft repeatedly pushed faulty versions of this program to
+ them. Microsoft repeatedly pushed faulty versions</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>this program to
users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
critical</a>.</p>
@@ -331,10 +329,12 @@
bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
+ that's the nature of proprietary</em></ins></span> software.</p>
</li>
- <li id="M201705180">
+ <span class="removed"><del><strong><li><p>
Microsoft</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
@@ -874,7 +874,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:59 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/proprietary-sabotage.it.po 7 Nov 2020 10:01:59 -0000
1.135
+++ proprietary/po/proprietary-sabotage.it.po 10 Nov 2020 17:37:43 -0000
1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary-sabotage.ja-diff.html 7 Nov 2020 10:02:01
-0000 1.76
+++ proprietary/po/proprietary-sabotage.ja-diff.html 10 Nov 2020 17:37:43
-0000 1.77
@@ -67,11 +67,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations are listed
below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -852,7 +852,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:02:01 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary/po/proprietary-sabotage.ja.po 7 Nov 2020 10:02:01 -0000
1.129
+++ proprietary/po/proprietary-sabotage.ja.po 10 Nov 2020 17:37:43 -0000
1.130
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/proprietary-sabotage.pot 7 Nov 2020 10:02:01 -0000
1.93
+++ proprietary/po/proprietary-sabotage.pot 10 Nov 2020 17:37:43 -0000
1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary-sabotage.ru-en.html 7 Nov 2020 11:30:44
-0000 1.88
+++ proprietary/po/proprietary-sabotage.ru-en.html 10 Nov 2020 17:37:43
-0000 1.89
@@ -52,11 +52,11 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Some malicious functionalities mediate sabotage, i.e. abusive
interference of the developer into the use of the software, with harmful
consequences for the users. Examples of such situations are listed below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -692,7 +692,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 11:30:44 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary/po/proprietary-sabotage.ru.po 7 Nov 2020 11:30:44 -0000
1.227
+++ proprietary/po/proprietary-sabotage.ru.po 10 Nov 2020 17:37:43 -0000
1.228
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.de-diff.html 17 Oct 2020
08:05:09 -0000 1.30
+++ proprietary/po/proprietary-subscriptions.de-diff.html 10 Nov 2020
17:37:43 -0000 1.31
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>It sounds simple to say that a certain program “requires a
subscription.” What that means concretely is that it contains a
time bomb, so that it will refuse to operate after that date. Or else
@@ -78,7 +78,7 @@
<span class="inserted"><ins><em><p>Examples of software subscriptions
that harmed users directly are
given below.</p>
-</div>
+</blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -237,7 +237,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-subscriptions.de.po 17 Oct 2020 08:05:09
-0000 1.34
+++ proprietary/po/proprietary-subscriptions.de.po 10 Nov 2020 17:37:43
-0000 1.35
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -122,7 +122,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | It sounds simple to say that a certain program “requires a
# | subscription.” What that means concretely is that it contains a time
# | bomb, so that it will refuse to operate after that date. Or else it is <a
@@ -152,7 +152,7 @@
"href=\"/proprietary/proprietary-tethers\">an einen Server gebunden</a> und "
"dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-subscriptions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-subscriptions.es-en.html 18 Oct 2020 09:59:20
-0000 1.9
+++ proprietary/po/proprietary-subscriptions.es-en.html 10 Nov 2020 17:37:43
-0000 1.10
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>It sounds simple to say that a certain program “requires a
subscription.” What that means concretely is that it contains a
time bomb, so that it will refuse to operate after that date. Or else
@@ -63,7 +63,7 @@
<p>Examples of software subscriptions that harmed users directly are
given below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/18 09:59:20 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.es.po 18 Oct 2020 09:59:20
-0000 1.22
+++ proprietary/po/proprietary-subscriptions.es.po 10 Nov 2020 17:37:43
-0000 1.23
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-18 11:36+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -82,7 +82,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -97,7 +97,7 @@
"<a href=\"/proprietary/proprietary-tethers.html#about-page\">depende de un "
"servidor</a> que comprueba la fecha. Ambas funcionalidades son maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-subscriptions.fr-en.html 17 Oct 2020 08:59:36
-0000 1.31
+++ proprietary/po/proprietary-subscriptions.fr-en.html 10 Nov 2020 17:37:43
-0000 1.32
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>It sounds simple to say that a certain program “requires a
subscription.” What that means concretely is that it contains a
time bomb, so that it will refuse to operate after that date. Or else
@@ -63,7 +63,7 @@
<p>Examples of software subscriptions that harmed users directly are
given below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-subscriptions.fr.po 17 Oct 2020 08:29:20
-0000 1.53
+++ proprietary/po/proprietary-subscriptions.fr.po 10 Nov 2020 17:37:43
-0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -91,7 +91,7 @@
"serveur</a> et que ce serveur vérifie la date. L'une et l'autre sont des "
"fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-subscriptions.ja-diff.html 17 Oct 2020
08:05:09 -0000 1.40
+++ proprietary/po/proprietary-subscriptions.ja-diff.html 10 Nov 2020
17:37:43 -0000 1.41
@@ -67,7 +67,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>It sounds simple to say that a certain program “requires a
subscription.” What that means concretely is that it contains a
time bomb, so that it will refuse to operate after that date. Or else
@@ -80,7 +80,7 @@
<span class="inserted"><ins><em><p>Examples of software subscriptions
that harmed users directly are
given below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -237,7 +237,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.ja.po 17 Oct 2020 08:05:09
-0000 1.30
+++ proprietary/po/proprietary-subscriptions.ja.po 10 Nov 2020 17:37:43
-0000 1.31
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-09-16 09:36+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "It sounds simple to say that a certain program “requires a "
@@ -123,7 +123,7 @@
"ãµã¼ãã¸ç¹ãæ¢ã</a>ããã¦ãã¦ããµã¼ããæ¥ä»ããã§ãã¯ãã¾ããã©ã¡ãã«ãã¦ã"
"æªæã®ããæ©è½ã§ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-subscriptions.pot 17 Oct 2020 08:05:09
-0000 1.27
+++ proprietary/po/proprietary-subscriptions.pot 10 Nov 2020 17:37:43
-0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -78,7 +78,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-subscriptions.ru-en.html 19 Oct 2020 10:00:05
-0000 1.31
+++ proprietary/po/proprietary-subscriptions.ru-en.html 10 Nov 2020 17:37:43
-0000 1.32
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>It sounds simple to say that a certain program “requires a
subscription.” What that means concretely is that it contains a
time bomb, so that it will refuse to operate after that date. Or else
@@ -63,7 +63,7 @@
<p>Examples of software subscriptions that harmed users directly are
given below.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -214,7 +214,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-subscriptions.ru.po 19 Oct 2020 10:00:05
-0000 1.59
+++ proprietary/po/proprietary-subscriptions.ru.po 10 Nov 2020 17:37:43
-0000 1.60
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -94,7 +94,7 @@
"proprietary/proprietary-tethers.html#about-page\">пÑивÑзана к
ÑеÑвеÑÑ</a>, а "
"ÑеÑÐ²ÐµÑ Ð¿ÑовеÑÑÐµÑ Ð´Ð°ÑÑ. Ð Ñо, и дÑÑгое
ÑвлÑеÑÑÑ Ð²ÑедоноÑной ÑÑнкÑией."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/proprietary-surveillance.de-diff.html 2 Nov 2020
17:32:39 -0000 1.137
+++ proprietary/po/proprietary-surveillance.de-diff.html 10 Nov 2020
17:37:43 -0000 1.138
@@ -107,7 +107,7 @@
</div>
<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -119,7 +119,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -257,14 +257,15 @@
<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>the dates of publication of linked articles.
The latest additions are listed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-<div</strong></del></span> <span class="inserted"><ins><em>the <a
+<div class="big-section">
+ <h3</strong></del></span> <span class="inserted"><ins><em>the <a
href="/proprietary/proprietary.html#latest">main page</a> of the
Malware section.</p>
-<div</em></ins></span> class="big-section">
- <h3 id="OSSpyware">Spyware in <span
class="removed"><del><strong>Operating Systems</h3></strong></del></span>
<span class="inserted"><ins><em>Laptops and
Desktops</h3></em></ins></span>
+<div class="big-section">
+ <h3</em></ins></span> id="OSSpyware">Spyware in <span
class="removed"><del><strong>Operating Systems</h3></strong></del></span>
<span class="inserted"><ins><em>Laptops and
Desktops</h3></em></ins></span>
<span class="anchor-reference-id">(<a
href="#OSSpyware">#OSSpyware</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -622,9 +623,7 @@
</li>
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
-
- <p>On the other hand,</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ <p>The natural extension of monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software to make sure they can't “fool”
@@ -1225,7 +1224,9 @@
data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ developers</em></ins></span> of <span class="removed"><del><strong>these
apps.</p>
+
+ <p>On the</strong></del></span> other <span
class="removed"><del><strong>hand,</strong></del></span> <span
class="inserted"><ins><em>nonfree programs.</p>
</li>
<li id="M201902140">
@@ -3856,7 +3857,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 17:32:39 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.351
retrieving revision 1.352
diff -u -b -r1.351 -r1.352
--- proprietary/po/proprietary-surveillance.de.po 2 Nov 2020 17:32:40
-0000 1.351
+++ proprietary/po/proprietary-surveillance.de.po 10 Nov 2020 17:37:43
-0000 1.352
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -136,7 +136,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "âWoher wussten sie, dass ich ein Hund bin?â"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -145,7 +145,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-surveillance.es-en.html 3 Nov 2020 12:00:44
-0000 1.28
+++ proprietary/po/proprietary-surveillance.es-en.html 10 Nov 2020 17:37:43
-0000 1.29
@@ -75,7 +75,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -87,7 +87,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/03 12:00:44 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary-surveillance.es.po 3 Nov 2020 12:00:44
-0000 1.95
+++ proprietary/po/proprietary-surveillance.es.po 10 Nov 2020 17:37:43
-0000 1.96
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-03 12:12+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -99,7 +99,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "«¿Cómo habrán descubierto que soy un perro?»"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -114,7 +114,7 @@
"com/2018/10/19/smart-home-devices-hoard-data-government-demands/\">decir si "
"espÃan a los usuarios por cuenta del Estado</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary/po/proprietary-surveillance.fr-en.html 2 Nov 2020 18:03:09
-0000 1.225
+++ proprietary/po/proprietary-surveillance.fr-en.html 10 Nov 2020 17:37:43
-0000 1.226
@@ -75,7 +75,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -87,7 +87,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.555
retrieving revision 1.556
diff -u -b -r1.555 -r1.556
--- proprietary/po/proprietary-surveillance.fr.po 2 Nov 2020 17:49:26
-0000 1.555
+++ proprietary/po/proprietary-surveillance.fr.po 10 Nov 2020 17:37:43
-0000 1.556
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-11-02 18:46+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -94,7 +94,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "« Comment ont-ils découvert que je suis un chien ? »"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -109,7 +109,7 @@
"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
"\">dire s'ils espionnent l'utilisateur au profit de l'Ãtat</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary/po/proprietary-surveillance.it-diff.html 2 Nov 2020
17:32:40 -0000 1.203
+++ proprietary/po/proprietary-surveillance.it-diff.html 10 Nov 2020
17:37:43 -0000 1.204
@@ -107,7 +107,7 @@
</div>
<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -119,7 +119,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -192,15 +192,15 @@
<li><a <span
class="removed"><del><strong>href="#SpywareEverywhere">Spyware
Everywhere</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInJavaScript">JavaScript</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVR">Spyware In
VR</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInFlash">Flash</a></li></em></ins></span>
</ul>
-<span class="removed"><del><strong></div></strong></del></span>
<span class="inserted"><ins><em><h4><a
href="#SpywareInNetworks">Spyware in
Networks</a></h4></em></ins></span>
</div>
-<div <span class="removed"><del><strong>style="clear: left;"></div>
+<span class="removed"><del><strong></div>
+<div style="clear: left;"></div>
-<!-- #Introduction -->
+<!-- #Introduction --></strong></del></span>
-<div</strong></del></span> class="big-section">
+<div class="big-section">
<h3 id="Introduction">Introduction</h3>
</div>
<div style="clear: left;"></div>
@@ -301,11 +301,11 @@
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
by force setting the telemetry mode to
“Full”</a>.</p>
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
+ <p>The <a
+
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys <a
-
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+ engineers to access, among other things, registry keys</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
which can contain sensitive information like administrator's login
password</a>.</p>
</li>
@@ -411,25 +411,21 @@
<li><p></strong></del></span> <span
class="inserted"><ins><em>ads.</p>
- <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's “privacy policy” to
overtly impose a
- “right” to</strong></del></span> look at users' files <span
class="removed"><del><strong>at any time. Windows 10 full disk
- encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
- gives Microsoft a key</a>.</p>
-
- <p>Thus, Windows is</strong></del></span> <span
class="inserted"><ins><em>for the US government
- on demand, though the “privacy policy” does not explicitly
- say so. Will it look at users' files for the Chinese government
+ <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's</strong></del></span> <span
class="inserted"><ins><em>look at users' files for the US government
+ on demand, though the</em></ins></span> “privacy policy” <span
class="removed"><del><strong>to overtly impose a
+ “right” to</strong></del></span> <span
class="inserted"><ins><em>does not explicitly
+ say so. Will it</em></ins></span> look at users' files <span
class="removed"><del><strong>at</strong></del></span> <span
class="inserted"><ins><em>for the Chinese government
on demand?</p>
</li>
<li id="M201506170">
<p>Microsoft uses Windows 10's “privacy policy”
to overtly impose a “right” to look at
- users' files at any time. Windows 10 full disk encryption <a
-
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">
+ users' files at</em></ins></span> any time. Windows 10 full disk
encryption <a <span
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"></em></ins></span>
gives Microsoft a key</a>.</p>
- <p>Thus, Windows is</em></ins></span> overt malware in regard to
surveillance, as in
+ <p>Thus, Windows is overt malware in regard to surveillance, as in
other issues.</p>
<p>We can suppose Microsoft look at users' files for the US
government
@@ -580,17 +576,31 @@
<p>The article confusingly describes gratis apps as “free”,
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
- “clean” Windows install is not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
+ for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
+ “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>its
own malware</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+ <p>Pairs of Android</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -608,95 +618,93 @@
<ul class="blurbs">
<li id="M202006260">
- <p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <p>Most</em></ins></span> apps <span
class="removed"><del><strong>can collude to transmit users' personal
+ data to servers.</strong></del></span> <span
class="inserted"><ins><em>are malware, but
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop</em></ins></span> on
<span class="removed"><del><strong>users</a>.</p>
- <p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>as well
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
- approach, but</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
- asked to send.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
+ <p>The article says</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>make
sure they can't “fool”
- the monitoring</a>.</p></em></ins></span>
+<li>
+<p>Google Play intentionally sends</strong></del></span> <span
class="inserted"><ins><em>Biden's</em></ins></span> app <span
class="removed"><del><strong>developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span> <span
class="inserted"><ins><em>has a less manipulative overall
+ approach, but</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
+ consider malicious, such as sending data</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>user has not explicitly
+ asked to send.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps</strong></del></span>
+ <li id="M201601110">
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading the “Terms and Conditions” that spell out
+what</strong></del></span> <span class="inserted"><ins><em>make
sure</em></ins></span> they <span class="removed"><del><strong>are
“consenting” to. Google should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>can't “fool”</em></ins></span>
+ the <span class="removed"><del><strong>information it collects on users,
instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201510050">
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
+ <li id="M201510050">
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Edward Snowden,
<a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
- data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>off,
listen to</em></ins></span> the <span class="removed"><del><strong>first
+place!</p>
</li>
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
- from investigation.</p>
+ <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call,</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>and web browsing history, and
+ read</em></ins></span> the <span
class="removed"><del><strong>tracking.</strong></del></span> <span
class="inserted"><ins><em>contact list.</em></ins></span> This <span
class="inserted"><ins><em>malware</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ from investigation.</p></em></ins></span>
</li>
- <li id="M201311120">
+ <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not
operate via</em></ins></span>
- the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
- phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
+ </li>
+
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span class="removed"><del><strong>the app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
-
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -706,100 +714,81 @@
<ul class="blurbs">
<li id="M202009183">
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their</strong></del></span>
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>by
surreptitously turning on the device's
- camera.</p></em></ins></span>
- </li>
+ on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to</strong></del></span>
+ <p>The article should</strong></del></span> <span
class="inserted"><ins><em>device's
+ camera.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202004200">
+ <li id="M202004200">
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>Siri software
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ made a practice of surreptitiously activating the Siri software to <a
+
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
+ This was not just occasional, it was systematic practice.</p>
+
+ <p>His job was to listen to</em></ins></span> these <span
class="removed"><del><strong>apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>recordings, in a group that made
+ transcripts of them. He does</em></ins></span> not <span
class="removed"><del><strong>free software. The clear</strong></del></span>
<span class="inserted"><ins><em>believes that Apple has ceased this
+ practice.</p>
- <p>The article should</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described these apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
- This was</em></ins></span> not <span class="removed"><del><strong>free
software. The clear way</strong></del></span> <span
class="inserted"><ins><em>just occasional, it was systematic practice.</p>
-
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in a group that made
- transcripts of them. He does not believes that Apple has ceased this
- practice.</p></em></ins></span>
+ <p>The only reliable</em></ins></span> way to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
- <p>The <span class="removed"><del><strong>article
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way
to prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
legitimate, but is</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no
right</strong></del></span>
<span class="inserted"><ins><em>controls access</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>the microphone to decide when the user has
- “activated” any service, to be free software, and the
- operating system under it free as well. This way,</em></ins></span> users
<span class="removed"><del><strong>are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>could make
- sure Apple can't listen to them.</p>
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as</strong></del></span> <span class="inserted"><ins><em>the
microphone to decide when the user has
+ “activated”</em></ins></span> any <span
class="removed"><del><strong>other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span
class="inserted"><ins><em>service,</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>be free software,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android</strong></del></span>
+ <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
+ sure Apple can't listen</em></ins></span> to <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201910131">
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs</em></ins></span> that <span
class="removed"><del><strong>snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>possibly correspond to
- “fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
- contains the websites of political opponents. By linking the requests
- originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Gratis
Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>(but not</strong></del></span> <span
class="inserted"><ins><em>contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most
nonfree apps contain
- trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing</em></ins></span> data <span class="inserted"><ins><em>from
Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p>
</li>
<li><p>Some manufacturers add a
<a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p></em></ins></span>
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>the Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS:</strong></del></span>
+<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>sure to place new items on top under each
subsection -->
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -811,7 +800,32 @@
</div>
<ul>
- <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ <li><p>Apple proposes</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span class="inserted"><ins><em>likely that
most nonfree apps contain
+ trackers. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>these send personally identifying</em></ins></span>
data <span class="removed"><del><strong>to Apple's
servers</a>.</strong></del></span> <span class="inserted"><ins><em>such
as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
+ <li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -825,21 +839,17 @@
</li>
<li id="M201702150">
- <p>Apple</em></ins></span> proposes <a
+ <p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
- — which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
+ fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
- lots of personal data to Apple's servers</a>. Big Brother can get
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>.</em></ins></span> Big
Brother can get
them from there.</p>
</li>
@@ -927,19 +937,19 @@
<span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or
it</em></ins></span>
+ is <span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
+ <p>The iThing</em></ins></span> also <span
class="removed"><del><strong>a feature for web sites</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites</em></ins></span> to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -1021,35 +1031,29 @@
<span class="inserted"><ins><em><li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't</em></ins></span> send <span
class="removed"><del><strong>so much</strong></del></span> <span
class="inserted"><ins><em>the location</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>while in
+ in airplane mode. It didn't</em></ins></span> send <span
class="removed"><del><strong>so much</strong></del></span> <span
class="inserted"><ins><em>the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
- <p>Android tracks location</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>Google <a
+ <p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>user, clearly must constitute
spying of some
- kind.</p></li>
-
- <li><p>A Motorola</strong></del></span> phone <span
class="inserted"><ins><em>has no SIM card</a>.</p>
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+ tracks the users' movements without their permission</a>.</p>
<p>Even if you disable Google Maps and location tracking, you must
disable Google Play itself to completely stop the tracking. This is
@@ -1061,15 +1065,20 @@
<li id="M201507030">
<p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
+ that users can't delete</a>, and they send so much</em></ins></span>
data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ of some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
@@ -1114,95 +1123,68 @@
<p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get</strong></del></span>
<span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
- <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>users is not enough</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions”</em></ins></span>
that <span class="inserted"><ins><em>spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install</strong></del></span> <span
class="inserted"><ins><em>collects</em></ins></span> on <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information about the users' searches that</strong></del></span>
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
-
- <p>However, to truly protect people's privacy, we must
prevent</em></ins></span> Google <span class="removed"><del><strong>normally
gets when
- they use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
- and <span class="inserted"><ins><em>other companies from getting this
personal information in</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span>
- <span class="inserted"><ins><em>first place!</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201111170">
- <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+ <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
+ </li>
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used</em></ins></span> by <span
class="inserted"><ins><em>most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of</em></ins></span> data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets
when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
- <p>This example illustrates</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at what time</a>.</p>
+ <p>Currently,</strong></del></span>
+ <span class="inserted"><ins><em>report even which page</em></ins></span>
the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
</li>
</ul>
@@ -1222,25 +1204,43 @@
<ul class="blurbs">
<li id="M201912190">
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found to <a
-
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>. Mozilla and Google
- removed the problematic extensions from their stores, but this shows
- once more</em></ins></span> how <span
class="removed"><del><strong>“getting</strong></del></span> <span
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are
supposed
+ for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla</em></ins></span> and <span
class="inserted"><ins><em>Google
+ removed</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ once more how unsafe nonfree software can be. Tools that are supposed
to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
+ additional malware (the system itself being the original
malware).</p></em></ins></span>
</li>
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811020">
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <p>The fact that this is used</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>repression of forbidden sharing
- makes it even more vicious.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
- <p>This illustrates that making unauthorized copies of nonfree
software</em></ins></span>
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
@@ -1504,17 +1504,17 @@
these apps, even if someone offers you a reward to do so. A
free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span>
+ was sued for collecting lots</strong></del></span>
<span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
@@ -1766,19 +1766,9 @@
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>the app; others only
say that the user is
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
@@ -1786,249 +1776,145 @@
</li>
<li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
+ many ways. This is one more.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
- source code they cannot look at.</em></ins></span> The other
- <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
- in <span class="removed"><del><strong>the car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information</em></ins></span>
about <span class="inserted"><ins><em>its users.
+ <p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
+ other but not to the server's database.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up to me</strong></del></span> <span class="inserted"><ins><em>physical
store by noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
+ uploads all phone numbers and email addresses</a> in user's address
book to developer's server.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the words
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="inserted"><ins><em>sent them and
text messages and emails to snoopers</a>.</p>
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did</em></ins></span> not <span
class="removed"><del><strong>just broadcasts</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
+ for the snooping of these apps.</p>
- <p>On</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their
being
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in</strong></del></span> <span class="inserted"><ins><em>source code
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>surveillance.</p>
- </li>
-
- <li><p>More</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
- various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span>
- <span class="inserted"><ins><em>prevent such snooping, except
when</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
- enough</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend</em></ins></span>
on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>each
other.</p>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It is possible to turn this off, but having it enabled by
default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being
watched</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users</em></ins></span>
by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
- social media participation, Tivo can now</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound
from beacons placed in stores or played</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web and</strong></del></span> TV <span
class="removed"><del><strong>advertisements play inaudible
sounds</strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>do lots
of surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
- range so as to</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
@@ -2509,9 +2395,8 @@
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices in range so as to</em></ins></span> determine that they
- are <span class="removed"><del><strong>nearby. Once your
- Internet devices are paired</strong></del></span> <span
class="inserted"><ins><em>nearby. Once your Internet devices are paired with
+ on other devices in range so as to determine that they
+ are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
@@ -2800,13 +2685,22 @@
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ this new feature and offering it to customers who pay for
it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware</strong></del></span>
- <li id="M202006300">
+ <span class="inserted"><ins><em><li id="M202006300">
<p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>, so the
+ coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
bosses can spy on them.</p>
<p>This shows why requiring the user's “consent” is not
@@ -2825,8 +2719,8 @@
<p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used by their
+ security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ software <span class="inserted"><ins><em>lack this. Of course, they are
also used by their
manufacturers for snooping.</p>
</li>
@@ -2861,88 +2755,170 @@
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ the devices</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
<span class="inserted"><ins><em>tethered to. Moreover, they are made available
to
+ Alexa. As a result, Amazon</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn</em></ins></span> it <span class="removed"><del><strong>doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p><small>(These crackers are probably hackers too, but please
<a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.)</small></p>
+<ul>
+ <li><p>Nest thermometers
+ send</strong></del></span> <span class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
</li>
- <li id="M201804140">
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over the Internet</a>.</p>
- </li>
+ offers</em></ins></span> a <span class="removed"><del><strong>woman came
up to me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
- <li id="M201706204">
- <p>Lots of “smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
-
- <p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+<ul>
+ <li>
+ <p>Vizio</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ <li id="M201706204">
+ <p>Lots of</em></ins></span> “smart” <span
class="inserted"><ins><em>products are designed</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
+
+ <p>Today's technological practice does not include any
way</em></ins></span> of <span
class="inserted"><ins><em>making</em></ins></span>
+ a <span class="removed"><del><strong>way to
+ disable the surveillance, even</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying
+ on you. Even</em></ins></span> if it <span
class="removed"><del><strong>were not hidden as</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ about you for later examination.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy</em></ins></span> on their
<span class="removed"><del><strong>users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span> <span
class="inserted"><ins><em>renters</a>.</p>
</li>
</ul>
@@ -2956,10 +2932,12 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
+ monitor how often people wear it</a>.</p></em></ins></span>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of what they do.</p>
+ <p>This <span class="removed"><del><strong>shows that laws requiring
products</strong></del></span> <span class="inserted"><ins><em>will teach the
sheeple</em></ins></span> to <span class="removed"><del><strong>get users'
formal
+ consent before collecting personal data are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>find it normal
that companies
+ monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
</li>
</ul>
@@ -2970,27 +2948,40 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+ permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
- <p><small>(Note that this article misuses the word “<a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
+ to mean “crackers.”)</small></p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
- <li id="M201603020">
- <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>an Android
app <a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <span class="inserted"><ins><em><li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
+ <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
@@ -3011,37 +3002,46 @@
upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
- <span class="removed"><del><strong>correlate ads</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
+ <p>Before you buy a “connected” car, make sure you can
+ disconnect its cellular antenna and its GPS antenna. If you want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Web
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street
Map.</p>
+ and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
</li>
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden and running with
- proprietary software.</p>
+ record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
+ cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
- <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
+ when they go</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>a junkyard the
driver's personal data goes with
them</a>.</p>
</li>
<li id="M201902011">
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>the
internal car network</a>. It is constantly
+ connected</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of
data,
including car location. This feature operates even when the ignition
- key is removed, and users report that they can't disable it.</p>
+ key is removed, and users report</em></ins></span> that they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
@@ -3657,7 +3657,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 17:32:40 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary/po/proprietary-surveillance.it.po 2 Nov 2020 17:32:41
-0000 1.363
+++ proprietary/po/proprietary-surveillance.it.po 10 Nov 2020 17:37:43
-0000 1.364
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -133,7 +133,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "“Come fanno a sapere che sono un cane?”"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -142,7 +142,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary/po/proprietary-surveillance.ja-diff.html 2 Nov 2020
17:32:41 -0000 1.221
+++ proprietary/po/proprietary-surveillance.ja-diff.html 10 Nov 2020
17:37:43 -0000 1.222
@@ -107,7 +107,7 @@
</div>
<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -119,7 +119,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -192,15 +192,15 @@
<li><a <span
class="removed"><del><strong>href="#SpywareEverywhere">Spyware
Everywhere</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInJavaScript">JavaScript</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVR">Spyware In
VR</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInFlash">Flash</a></li></em></ins></span>
</ul>
-<span class="removed"><del><strong></div></strong></del></span>
<span class="inserted"><ins><em><h4><a
href="#SpywareInNetworks">Spyware in
Networks</a></h4></em></ins></span>
</div>
-<div <span class="removed"><del><strong>style="clear: left;"></div>
+<span class="removed"><del><strong></div>
+<div style="clear: left;"></div>
-<!-- #Introduction -->
+<!-- #Introduction --></strong></del></span>
-<div</strong></del></span> class="big-section">
+<div class="big-section">
<h3 id="Introduction">Introduction</h3>
</div>
<div style="clear: left;"></div>
@@ -446,7 +446,8 @@
voice input.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+ Windows 8.1</strong></del></span>
<span class="inserted"><ins><em><li id="M201401150">
<p id="baidu-ime"><a
@@ -458,8 +459,8 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
- Windows 8.1 snoops on local <span
class="removed"><del><strong>searches.</a>.</p>
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+ Windows 8.1</em></ins></span> snoops on local <span
class="removed"><del><strong>searches.</a>.</p>
</li>
<li><p>And</strong></del></span> <span
class="inserted"><ins><em>searches</a>. And</em></ins></span> there's a
<a
@@ -607,9 +608,9 @@
as snooping on them itself</a>.</p></em></ins></span>
<p>The article <span class="removed"><del><strong>takes for
granted</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> that <span
class="removed"><del><strong>the usual analytics tools are
- legitimate,</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
- approach,</em></ins></span> but <span class="removed"><del><strong>is that
valid? Software developers have no right to
- analyze what users are doing or how. “Analytics”
tools</strong></del></span> that <span class="removed"><del><strong>snoop are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>Biden's app has a
less manipulative overall
+ approach, but</em></ins></span> that <span
class="removed"><del><strong>snoop are
just as wrong</strong></del></span> <span class="inserted"><ins><em>does not
tell us whether it has functionalities we
consider malicious, such</em></ins></span> as <span
class="removed"><del><strong>any other snooping.</p>
</li>
@@ -641,57 +642,80 @@
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>any
file</strong></del></span> <span class="inserted"><ins><em>turn the
phones</em></ins></span> on <span class="inserted"><ins><em>and off, listen
to</em></ins></span> the <span class="removed"><del><strong>system.</p>
+ them</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span class="inserted"><ins><em>turn</em></ins></span>
the <span class="removed"><del><strong>system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>disguise itself
- from investigation.</p>
- </li>
-
- <li id="M201311120">
- <p><a
-
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>smart phones, including iPhones,
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span> <span
class="inserted"><ins><em>and off, listen to the microphone,
+ retrieve geo-location</em></ins></span> data <span
class="inserted"><ins><em>from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them</strong></del></span> <span
class="inserted"><ins><em>disguise itself</em></ins></span>
+ from <span
class="removed"><del><strong>there.</p></strong></del></span> <span
class="inserted"><ins><em>investigation.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></em></ins></span>
- lots of <span class="removed"><del><strong>personal data to Apple's
servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>bugs in the phones' radio
software</a>.</p></em></ins></span>
+ detail here, it seems</em></ins></span> that <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving the code Apple
+ sends to it.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span>
+ <li><p>Around 47%</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</em></ins></span> of <span class="inserted"><ins><em>bugs
in</em></ins></span> the <span class="removed"><del><strong>most popular iOS
apps</strong></del></span> <span class="inserted"><ins><em>phones' radio
software</a>.</p>
+ </li>
+
+ <li id="M201307000">
+ <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+ them</a>. (The US says it will eventually require</em></ins></span>
all <span class="removed"><del><strong>the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
</ul>
@@ -703,401 +727,556 @@
<ul class="blurbs">
<li id="M202009183">
- <p>Facebook <a
-
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>device's
- camera.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Users cannot make
an</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202004200">
- <p>Apple whistleblower Thomas Le Bonniec reports
that</em></ins></span> Apple <span
class="removed"><del><strong>ID</strong></del></span>
- <span class="inserted"><ins><em>made a practice of surreptitiously
activating the Siri software to</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Instagram</a> users</em></ins></span> by
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is</strong></del></span> <span
class="inserted"><ins><em>device's
+ camera.</p>
+ </li>
+
+ <li id="M202004200">
+ <p>Apple whistleblower Thomas Le Bonniec reports that Apple
+ made</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>practice of surreptitiously activating the Siri
software</em></ins></span> to <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
- This was not just occasional, it was systematic practice.</p>
+ This was not just occasional,</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>was systematic practice.</p>
+
+ <p>His job was to listen to these recordings, in</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>group that made
+ transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He
does not believes that Apple has ceased</em></ins></span> this
+ <span class="inserted"><ins><em>practice.</p>
+
+ <p>The only reliable way</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is,
for the program that
+ controls access</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>the
microphone</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving</strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in</em></ins></span> a
<span class="removed"><del><strong>valid email address</strong></del></span>
<span class="inserted"><ins><em>group that made
- transcripts of them. He does not believes that Apple has ceased this
- practice.</p>
-
- <p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
- “activated” any service, to be free
software,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> the <span
class="removed"><del><strong>code</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
- sure</em></ins></span> Apple
- <span class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>can't listen</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>decide when</em></ins></span> the <span
class="removed"><del><strong><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+ <li><p>There is also a feature for web
sites</strong></del></span> <span class="inserted"><ins><em>user has
+ “activated” any service,</em></ins></span> to <span
class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span class="inserted"><ins><em>be free software, and
the
+ operating system under</em></ins></span> it
+ <span class="removed"><del><strong>is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span> <span class="inserted"><ins><em>free as
well. This way, users could make
+ sure</em></ins></span> Apple <span class="removed"><del><strong>its
geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>can't listen to them.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201910131">
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to</em></ins></span> the
<span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
- “fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black
list</em></ins></span> most <span class="removed"><del><strong>popular iOS apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
- originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing</em></ins></span> data from <span
class="removed"><del><strong>iPhones for the state</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to</strong></del></span>
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the
data</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> in <span
class="removed"><del><strong>an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite of</em></ins></span> Apple's <span
class="removed"><del><strong>servers all the photos and
- videos they make.</p>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>China</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>supposed commitment</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone apps contain trackers
that</em></ins></span> are <span class="removed"><del><strong>automatically
updated everywhere. [...]
- </p></blockquote>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature
is</strong></del></span> <span class="inserted"><ins><em>busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>check URLs that possibly
correspond</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span>
+ <span class="inserted"><ins><em>“fraudulent” websites. Since
Tencent collaborates
+ with</em></ins></span> the <span class="removed"><del><strong>phones
+ on and off, listen to</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
+ contains</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>websites of
political opponents. By linking the requests
+ originating</em></ins></span> from <span class="inserted"><ins><em>single
IP addresses,</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>government can identify
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>read the contact list. This malware is designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>Hong Kong, thus endangering their
lives.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Samsung phones come
with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em>are
busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
+ Channel (owned by IBM), the crime-alert service Citizen,
Yelp</em></ins></span>
+ and <span class="removed"><del><strong>they send so much
data</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it is
likely</em></ins></span> that <span class="removed"><del><strong>their
transmission is a
+ substantial expense for users. Said transmission, not
wanted</strong></del></span> <span class="inserted"><ins><em>most nonfree apps
contain
trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ fingerprint, exact location, email address, phone number</em></ins></span>
or
+ <span class="removed"><del><strong>requested by</strong></del></span>
<span class="inserted"><ins><em>even
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company, there is no telling what it will be
+ used for.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>FBI can remotely activate</strong></del></span>
<span class="inserted"><ins><em>iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <p>In</em></ins></span> the <span class="removed"><del><strong>GPS
and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>Bluetooth the obvious way</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want to be spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="inserted"><ins><em>use it without having your fingerprints
taken. Users would</em></ins></span> have <span
class="removed"><del><strong>GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span>
+ <span class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>tell whether</em></ins></span> the <span
class="removed"><del><strong>use of data</strong></del></span> <span
class="inserted"><ins><em>phone is snooping</em></ins></span> on <span
class="removed"><del><strong>the user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
- </li>
-
- <li id="M201609280">
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
- </li>
-
- <li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
- and videos they make.</p>
-
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. […]
</p></blockquote>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data</em></ins></span> to <span
class="inserted"><ins><em>Apple's servers</a>. Big Brother
can</em></ins></span> get <span class="removed"><del><strong>the user's list of
other people's phone
+ numbers.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>them from
there.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+
+ <li><p>The Uber</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>user types
into it</a>;</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span>
+ <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>surveillance
is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>at least 30 days.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings automatically upload to Apple's servers</em></ins></span>
all <span class="removed"><del><strong>conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>the photos</em></ins></span>
+ and <span class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic</strong></del></span> <span
class="inserted"><ins><em>videos they make.</p>
+
+ <blockquote><p> iCloud</em></ins></span> Photo <span
class="removed"><del><strong>app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's</strong></del></span> <span
class="inserted"><ins><em>Library stores every</em></ins></span> photo <span
class="removed"><del><strong>collections for known
faces</a>,</strong></del></span> and <span
class="removed"><del><strong>suggests</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> you
+ <span class="inserted"><ins><em>take, and keeps them up</em></ins></span>
to <span class="removed"><del><strong>share the picture</strong></del></span>
<span class="inserted"><ins><em>date on all your devices. Any
edits</em></ins></span> you <span class="removed"><del><strong>take according
to who</strong></del></span>
+ <span class="inserted"><ins><em>make are automatically updated everywhere.
[…] </p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the
- startup of iOS</a>. The term “cloud” means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
- <p>There is a way to
- <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of this to <a
+ <p>Unknown people apparently took advantage of
this</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ nude photos of many celebrities</a>. They needed</em></ins></span>
to <span class="removed"><del><strong>be
+ sent across the wire</strong></del></span> <span
class="inserted"><ins><em>break Apple's
+ security</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers and face-recognition
+ algorithms.</p>
- <li><p>Spyware in iThings:
- the</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>get at them, but NSA can access any</em></ins></span>
of <span class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't
“upload”</strong></del></span> them <span
class="removed"><del><strong>to the service.</p></strong></del></span>
<span class="inserted"><ins><em>through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
+ <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>regularly
does,</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>,
and</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract</em></ins></span> some
+ <span class="removed"><del><strong>are starting to realize that it is
nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>data from iPhones for</em></ins></span> the <span
class="inserted"><ins><em>state</a>.</p>
- <p>This may have improved with <a
-
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
+ <p>This may have improved with</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ not</em></ins></span> as <span class="removed"><del><strong>a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>much as Apple
claims</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many proprietary
apps</strong></del></span>
- <li id="M201407230">
+ <span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Several “features” of iOS seem to exist</em></ins></span>
+ for <span class="removed"><del><strong>mobile devices report
which</strong></del></span> <span class="inserted"><ins><em>no possible
purpose</em></ins></span> other
+ <span class="removed"><del><strong>apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here</em></ins></span>
is <span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></em></ins></span>
</li>
- <li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401100">
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get</em></ins></span> other info too.</p>
+ get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312300">
+ <li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
+ Either Apple helps the NSA</em></ins></span> snoop on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>addition to
+ the snooping done by the phone company, and
perhaps</strong></del></span> <span class="inserted"><ins><em>an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
+ tells Apple its geolocation</a></em></ins></span> by <span
class="removed"><del><strong>the OS in the
+ phone.</p>
- <li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p>
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>default, though that can</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get
+ users to say “I agree”. That</strong></del></span>
+ <span class="inserted"><ins><em>turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
+ <li id="M201210170">
+ <p>There</em></ins></span> is <span class="removed"><del><strong>no
excuse</strong></del></span> <span class="inserted"><ins><em>also a
feature</em></ins></span> for <span
class="removed"><del><strong>malware.</p>
</li>
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>web sites to track users, which is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</em></ins></span> by <span
class="removed"><del><strong>companies.</a></p>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask</strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article
talks</em></ins></span> about <span
class="removed"><del><strong>sending</strong></del></span> <span
class="inserted"><ins><em>iOS 6, but</em></ins></span> it <span
class="inserted"><ins><em>is
+ still true in iOS 7.)</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ <li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
+ to <span class="removed"><del><strong>other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving</em></ins></span> a <span class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>valid
+ email address and receiving the verification code Apple
sends</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>user
takes</a>: starting an app, looking at a folder,
+ <p>Xiaomi phones <a
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking at a
folder,
visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
-
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
- but we condemn this no matter who does it.</p>
+ <p>Other nonfree programs snoop too. For instance, Spotify and
+ other streaming dis-services make a dossier about each user,
and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make</em></ins></span>
+ users identify themselves <span class="removed"><del><strong>and then
sends personal data about them</strong></del></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
+
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
+ but we condemn this no matter who does it.</p></em></ins></span>
</li>
- <li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
+ <p>Facebook's app got “consent” to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"></em></ins></span>
+ it <span class="removed"><del><strong>too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>saved up the data, and sent them all
later</a>.</p>
</li>
<li id="M201711210">
- <p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ the phone has no SIM card</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
- </li>
- <li id="M201609140">
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
- </li>
+<ul>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ <p>The company's statement that it anonymizes the data may be
+ true, but it doesn't really matter. If it sells
the</strong></del></span> data to <span class="removed"><del><strong>a
+ data broker, the data broker can figure out who the user
is.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
- </li>
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+ <p>The app reports the temperature</strong></del></span>
- <span class="inserted"><ins><em><li id="M201308010">
- <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <span class="inserted"><ins><em><li id="M201609140">
+ <p>Google Play (a component</em></ins></span> of <span
class="inserted"><ins><em>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</em></ins></span> the <span class="removed"><del><strong>vibrator
minute by
+ minute (thus, indirectly, whether it is surrounded by a person's
+ body),</strong></del></span> <span class="inserted"><ins><em>users'
movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>tracking. This is
+ yet another example of nonfree software pretending to
obey</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>user,
+ when it's actually doing something else. Such</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>thing</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than</strong></del></span> <span
class="inserted"><ins><em>be almost
+ unthinkable with</em></ins></span> free <span
class="removed"><del><strong>software which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other
people's</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
- </li>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201307250">
- <p>A Motorola</em></ins></span> phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+ <span class="inserted"><ins><em><li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>any file</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>the system.</p>
+ </li>
+
+ <li id="M201308010">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a>
on</strong></del></span> <span class="inserted"><ins><em>microphone in Android
phones
+ and laptops</a> (presumably</em></ins></span> Windows <span
class="removed"><del><strong>installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>laptops). Here</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <li><p>The Uber</strong></del></span>
+ <li id="M201307280">
+ <p>Spyware is present</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>ride</a>.</p>
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>personal
details of users that install</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a
protection against massive
- surveillance.</p>
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
+ <li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on</strong></del></span> <span
class="inserted"><ins><em>spell out</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs</strong></del></span>
- <span class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on what users
post</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
- honestly identify the information it collects</em></ins></span> on <span
class="removed"><del><strong>various sites</strong></del></span> <span
class="inserted"><ins><em>users, instead of
- hiding it in an obscurely worded EULA.</p>
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ </li>
+
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+
+ <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>users is not enough to
+ legitimize actions like this. At</em></ins></span> this <span
class="removed"><del><strong>way, because</strong></del></span> <span
class="inserted"><ins><em>point, most users have stopped
+ reading the “Terms and Conditions” that spell out
what</em></ins></span>
+ they <span class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>are “consenting” to. Google should
clearly and
+ honestly identify the information it collects on users, instead of
+ hiding</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
@@ -1105,251 +1284,235 @@
</li>
<li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</em></ins></span> such as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p>
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
+ <p>Spyware in many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
+ report even which page the user reads at what
time</a>.</p></em></ins></span>
</li>
+</ul>
+
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
-<span class="inserted"><ins><em></ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareOnTheRoad">Spyware
on The Road</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201912190">
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>Google
- removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that</em></ins></span>
are <span class="removed"><del><strong>starting</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span>
- to <span class="removed"><del><strong>realize that</strong></del></span>
<span class="inserted"><ins><em>protect a proprietary system are, instead,
infecting</em></ins></span> it <span class="removed"><del><strong>is
nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>with
- additional malware (the system itself being</em></ins></span> the <span
class="inserted"><ins><em>original malware).</p>
+ for Firefox and Chrome were found to</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>problematic extensions from their stores, but
this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting</em></ins></span>
it <span class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>with
+ additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
</li>
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The
result</em></ins></span> is
- <span class="inserted"><ins><em>often</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>legal threat demanding a lot of money.</p>
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="inserted"><ins><em>nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
+ makes</em></ins></span> it <span class="removed"><del><strong>to outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202003010">
<p>The Alipay Health Code app
- estimates whether</em></ins></span> the user has
- <span class="removed"><del><strong>installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>Covid-19</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span> <span class="inserted"><ins><em>cops
directly</a>.</p></em></ins></span>
+ estimates whether the user has Covid-19</em></ins></span> and <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ <li id="M202001290">
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging app seems to be a</em></ins></span> <a
<span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that</em></ins></span> is
<span class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>a good
- reason</em></ins></span> to <span class="inserted"><ins><em>use free
software instead.</p>
+ <p>The ToToc messaging app seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
+ <p><small>Note: this article uses the word
“free”</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span>
the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
+ <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>sense of “gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users</strong></del></span> <span class="inserted"><ins><em>device.
Many employers demand</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>do this. For the
- employee, this</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if</em></ins></span> they
<span class="removed"><del><strong>report even which page</strong></del></span>
<span class="inserted"><ins><em>install their own
+ software on</em></ins></span> the <span class="removed"><del><strong>user
reads at what time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
and as dangerous as any other nonfree software.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Chinese Communist
Party's “Study
- the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em>requires users to grant</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130">
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="removed"><del><strong>e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span> <span
class="inserted"><ins><em>Great Nation” app requires
users</em></ins></span> to <span class="removed"><del><strong>Adobe</a>.
Adobe's “excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>grant it
<a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and the Android version was
found</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>contain a
- back-door allowing developers</em></ins></span> to <span
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span
class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="removed"><del><strong>developer</strong></del></span>
<span class="inserted"><ins><em>is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
- ask about sending it to other companies. This
shows</strong></del></span>
- <span class="inserted"><ins><em>readable after copy-pasting in a text
editor) includes a clarification
- saying that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android
version</em></ins></span>
- of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ access</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
</li>
-<span class="removed"><del><strong></ul>
-
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
+ internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>users'
+ phone, as “superusers.” Downloading and using this
+ app</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>mandatory at some workplaces.</p>
+
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>tests
were only performed on</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Android version
+ of</em></ins></span> the <span class="removed"><del><strong>time; it is
possible</strong></del></span> <span class="inserted"><ins><em>app, and that,
according</em></ins></span> to <span class="removed"><del><strong>physically
remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
<span class="inserted"><ins><em><li id="M201909091">
- <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which</strong></del></span>
<span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks</em></ins></span> users <span class="removed"><del><strong>identify
themselves and then sends personal data about</strong></del></span> <span
class="inserted"><ins><em>even when it is turned off</a>, after
tricking</em></ins></span> them
- <span class="inserted"><ins><em>into giving the app broad permissions in
order</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>use one of its
- functionalities.</p></em></ins></span>
+ tracks users even when it</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>turned off</a>, after tricking them
+ into giving the app broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>use one of its
+ functionalities.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to Facebook</a>.</p>
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>users' lives to
Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
- proprietary program</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. <a
+ program</em></ins></span> is <span class="removed"><del><strong>not
+ really</strong></del></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="removed"><del><strong>proprietary</strong></del></span> surveillance.
<span class="removed"><del><strong>These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage to spy through it
too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
+ A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>all the 10,000 or more people
+ who have installed it</a>.</p>
- <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="removed"><del><strong>personal information about
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or
more</em></ins></span> people <span
class="removed"><del><strong>use</strong></del></span>
- <span class="inserted"><ins><em>who have installed</em></ins></span>
it</a>.</p>
-
- <span class="removed"><del><strong><p>The company's statement
that it anonymizes the data may</strong></del></span>
-
- <span class="inserted"><ins><em><p>With a free program there would
not</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it sells</strong></del></span> <span class="inserted"><ins><em>a list of who
has installed
+ <p>With a free program there would not</em></ins></span> be <span
class="removed"><del><strong>replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>a list of who has installed
it.</p>
</li>
@@ -1357,33 +1520,31 @@
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing
features
- of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>operating system, in order</em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>gather as much private</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>as
+ of</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span
class="inserted"><ins><em>order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>software we run.</p>
- </li>
+ having control over</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
- <li id="M201907080">
- <p>Many Android apps</em></ins></span> can <span
class="removed"><del><strong>figure out who</strong></del></span> <span
class="inserted"><ins><em>track
- users' movements even when</em></ins></span> the user <span
class="removed"><del><strong>is.</p>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>software we run.</p>
</li>
- <li><p>A computerized
- vibrator</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control
app</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>allow
them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
- <li id="M201905300"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Femm
“fertility”</em></ins></span> app <span
class="removed"><del><strong>reports the temperature of the vibrator minute by
- minute (thus, indirectly, whether it</strong></del></span> is <span
class="removed"><del><strong>surrounded</strong></del></span> <span
class="inserted"><ins><em>secretly a <a
+ <li id="M201905300">
+ <p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a></em></ins></span> by <span
class="inserted"><ins><em>natalist Christians. It spreads distrust
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
@@ -1391,227 +1552,243 @@
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>person's
- body), and the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em><a
+ <p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>event.</p>
+ the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>event.</p>
- <p>This app is</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span> can <span
class="removed"><del><strong>check</strong></del></span> <span
class="inserted"><ins><em>snoop on a lot of
- sensitive data, including user's location and contact
list,</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>has <a
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's</em></ins></span> location <span
class="removed"><del><strong>at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p></em></ins></span>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the
+ data <span class="inserted"><ins><em>is
“anonymized</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it <span
class="removed"><del><strong>over, the state</strong></del></span> can <span
class="removed"><del><strong>store it.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>do so. A
- free-software app that does more or less the same thing without
- spying</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
<div style="clear: left;"></div>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>spy
on</strong></del></span> <span class="inserted"><ins><em>equal employment
+ and freedom to make</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p>
+ </li>
+</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>do so. A
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>you
is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>new
one</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>being
developed</a>.</p>
+ <li><p>More</strong></del></span> <span
class="inserted"><ins><em>does more</em></ins></span> or less <span
class="removed"><del><strong>all “smart” TVs <a href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>the same thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p>
+
+ <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>Android phones and
iPhones
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the phone has</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Nonfree software in the phone</em></ins></span> has <span
class="removed"><del><strong>got better.</p>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>location data to
Google.</p>
+ <p>This shows that laws requiring products</strong></del></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
+ the location</em></ins></span> data <span class="removed"><del><strong>are
totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>Parliament
- this way, because they</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or</em></ins></span> pass it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access to
- the network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>massive
- surveillance on which the user has absolutely no
control.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>TV will
+ not work.”</p>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on to user-installed
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>have
access</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span>
+ the <span class="removed"><del><strong>user watches
—</strong></del></span> <span class="inserted"><ins><em>network
but</em></ins></span> no <span
class="removed"><del><strong>exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct
access to the data. This results</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>massive
+ surveillance</em></ins></span> on
+ <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>which the user has
absolutely no control.</p>
</li>
-</ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
- for invasive advertising or discriminating against
people</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>poor
+ <p>It</strong></del></span> <span class="inserted"><ins><em>poor
medical condition.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>buried in
- lengthy terms of service that are difficult</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books</strong></del></span>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>buried in
+ lengthy terms of service that</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span> <span
class="inserted"><ins><em>difficult</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>understand. In any
case,
+ “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by</strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
+ <li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>malware running on other devices in
+ range so as</strong></del></span>
+ <span class="inserted"><ins><em>library for building mobile apps, which
also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>trust a nonfree program, not even the
- developers of other nonfree programs.</p>
- </li>
+ sent personal data</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing</em></ins></span> that
<span class="inserted"><ins><em>all the personal
+ data</em></ins></span> they <span class="removed"><del><strong>are nearby.
Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>collected
would go to Facebook as well.</p>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>code snoops on readers</a>.</p>
+ <p>It shows that no one</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
</li>
+ <li><p>Vizio “smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't</strong></del></span> <span
class="inserted"><ins><em>trust</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ misuse</em></ins></span> users' <span class="removed"><del><strong>voice
on</strong></del></span> <span class="inserted"><ins><em>personal
data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>would then have to
+ give it to</strong></del></span> <span class="inserted"><ins><em><a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span class="removed"><del><strong>US
or some other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done</strong></del></span>
<span class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>resetting it.</p>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>apparent violation of
+ <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
+ and, once informed, was</em></ins></span> in
+ <span class="removed"><del><strong><a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches, and
+ the switch to turn this off has</strong></del></span> no <span
class="removed"><del><strong>effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>hurry to take action. This proves</em></ins></span>
+ that the
+ <span class="removed"><del><strong>transmission
reports</strong></del></span> <span class="inserted"><ins><em>policies
of</em></ins></span> a <span class="removed"><del><strong>404 error really
means nothing;</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p>
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>server
+ could save</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
+ <p>Twenty nine “beauty camera” apps</em></ins></span>
that <span class="removed"><del><strong>data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>used to
+ be</em></ins></span> on <span class="removed"><del><strong>the user's
local network.</a></p>
+
+ <p>LG later said it</strong></del></span> <span
class="inserted"><ins><em>Google Play</em></ins></span> had <span
class="removed"><del><strong>installed a patch to stop this, but any product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>even what they wanted to
record.</a></p>
+ </li>
+</ul>
+
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop</strong></del></span> <span
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>redirecting
+ them</em></ins></span> to <span class="removed"><del><strong>the
+ internet</a>— even what</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole</em></ins></span> their
<span class="removed"><del><strong>users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer
with
+ a</strong></del></span> <span class="inserted"><ins><em>credentials.
Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ haven't yet, but they should also stay away from</em></ins></span> nonfree
<span class="removed"><del><strong>operating system.</p>
+ </li>
+
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect</strong></del></span> <span class="inserted"><ins><em>apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>wide range</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>knowing what</em></ins></span> they <span
class="inserted"><ins><em>really do.</p>
</li>
<li id="M201902010">
@@ -2639,83 +2816,51 @@
the devices are tethered to. Moreover, they are made available to
Alexa. As a result, Amazon has a very precise picture of users' life
at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p></em></ins></span>
+ in the future too?)</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904240">
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the Alexa service staff even has
access</em></ins></span> to <span class="removed"><del><strong>Adobe</a>.
Adobe's “excuse”:</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>A fraction of the Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
<p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where</em></ins></span> it's
- <span class="removed"><del><strong>needed</strong></del></span> <span
class="inserted"><ins><em>done”), users have no way</em></ins></span>
- to <span class="removed"><del><strong>check DRM!</p>
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>know what happens to
the recordings unless human eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
- effectively
- anyone</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>user is still
- paying</em></ins></span> for
- <span class="removed"><del><strong>authentication, you
couldn't</strong></del></span> <span class="inserted"><ins><em>the
subscription, and hasn't printed more pages than were
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may</em></ins></span> be
<span class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>cheaper in some
+ <p>Even though the ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>would otherwise be</em></ins></span> in
- <span class="inserted"><ins><em>working order.</p>
+ restrictions in the use of ink cartridges that would otherwise be in
+ working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
- and</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="removed"><del><strong>demands blind
faith from its users</a>.</p>
-
- <p>Even</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="removed"><del><strong>no one connects</strong></del></span> <span
class="inserted"><ins><em>some government such as China or the US
- told Amazon to do this, or cease</em></ins></span> to <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>moral
fiber to say no?</p>
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
@@ -2726,38 +2871,30 @@
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>car's movements</strong></del></span> <span
class="inserted"><ins><em>house,</em></ins></span> all the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
a device that can obey your voice commands without potentially spying
- on you. Even if</em></ins></span> it is <span
class="removed"><del><strong>possible to physically remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data</em></ins></span> about <span class="removed"><del><strong>drivers'
movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>the user</a>.</p>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -2774,7 +2911,7 @@
monitor how often people wear it</a>.</p>
<p>This will teach the sheeple to find it normal that companies
- monitor every aspect</em></ins></span> of <span
class="inserted"><ins><em>what they do.</p>
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2783,108 +2920,68 @@
<ul class="blurbs">
<li id="M202009100">
- <p>Internet-enabled watches with</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span>
- are <span class="removed"><del><strong>an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>malware, violating people (specially children's)
- privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>security flaws. They <a
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to and
from</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>watch, possibly endangering</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>child.</p>
-
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>word “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”</em></ins></span>
- to <span class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>mean
“crackers.”)</small></p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
</li>
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The
company</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article</em></ins></span> says <span
class="removed"><del><strong>it doesn't
- store</strong></del></span> this <span
class="removed"><del><strong>information,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it to get the data
- and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>that could
be a
- misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to <span class="removed"><del><strong>place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>report its location</em></ins></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>someone else and to transmit conversations
- too</a>.</p></em></ins></span>
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
+ too</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008181">
<p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>AWS to help create custom insurance premiums</a>
+ upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
<p>Before you buy a “connected” car, make sure you can
- disconnect its cellular antenna</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.
If</em></ins></span> you <span class="removed"><del><strong>on
television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>want
+ disconnect its cellular antenna and its GPS antenna. If you want
GPS navigation, get a separate navigator which runs free software
and works with Open Street Map.</p>
</li>
<li id="M201912171">
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible,</em></ins></span> as
<span class="inserted"><ins><em>it involves
+ the user, access to the data is nearly impossible, as it involves
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>personal data, and <a
+ <p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="removed"><del><strong>get
users' formal
- consent before collecting</strong></del></span> <span
class="inserted"><ins><em>a junkyard the driver's</em></ins></span> personal
data <span class="removed"><del><strong>are totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>goes with
+ when they go to a junkyard the driver's personal data goes with
them</a>.</p>
</li>
@@ -2892,193 +2989,117 @@
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford</em></ins></span> a
<span class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of data,
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in
breaking</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent to tracking,</strong></del></span>
- <span class="inserted"><ins><em>connectivity by
disconnecting</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>cellular modem, or
wrapping</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span>
- <span class="inserted"><ins><em>antenna in aluminum
foil?</p></em></ins></span>
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201811300">
+ <li id="M201811300">
<p>In China, it is mandatory for electric
- cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>terminal</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em><a
+ cars to be equipped with a terminal that <a
href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,</em></ins></span>
- to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In practice,
<a
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>data</a> as part of their own spying, then
- forward</em></ins></span> it <span class="removed"><del><strong>enabled by
default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> to the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
</li>
<li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>company
already
- monitors. Tivo customers are unaware they're being
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio
programs</a> in its
- “connected” cars, minute</em></ins></span> by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance</strong></del></span> <span
class="inserted"><ins><em>minute.</p>
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could have got that
easily</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
- <span class="inserted"><ins><em>sneaking it into the contract that users
sign for some digital service
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection
should</em></ins></span> be
- <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
-
- <p>But if you really want</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>data, or that
the software
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
<li id="M201711230">
- <p>AI-powered driving apps</em></ins></span> can
- <span class="removed"><del><strong>correlate ads with Web activity, and
- other</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree
software</em></ins></span> are <span
class="removed"><del><strong>watching</a>,
- even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>AI-powered driving apps can <a
+
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software are <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></em></ins></span>
+ snooping devices</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201602240">
+ <li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>system
has no authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it <span
class="removed"><del><strong>and would then have to
- give</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't be confident that Nissan
+ <p>That's easy to</em></ins></span> do <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>because the system has no authentication
+ when accessed</em></ins></span> through <span
class="removed"><del><strong>ad networks</strong></del></span> <span
class="inserted"><ins><em>the modem. However, even if it asked
+ for authentication, you couldn't be confident</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>Nissan
has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which
means</em></ins></span>
- it <span class="inserted"><ins><em>demands blind faith from its
users</a>.</p>
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone modem, though.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Tesla cars allow</em></ins></span> the <span
class="inserted"><ins><em>company to extract</em></ins></span>
+ data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>sites made by different
+ companies.</p>
- <p>Even if no one connects</em></ins></span> to the <span
class="removed"><del><strong>US or some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company</em></ins></span> to <span
class="removed"><del><strong>be trusted unless</strong></del></span> <span
class="inserted"><ins><em>track the car's movements all the
time;</em></ins></span>
- it is <span class="removed"><del><strong>done
- by free software in your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>possible to physically remove the cell phone
modem, though.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>company to extract
- data remotely</em></ins></span> and <span
class="inserted"><ins><em>determine</em></ins></span> the <span
class="removed"><del><strong>switch to turn</strong></del></span> <span
class="inserted"><ins><em>car's location
+ <p>They use</strong></del></span> <span
class="inserted"><ins><em>determine the car's location
at any time. (See Section 2, paragraphs b and c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>off has no
effect. (The fact that</strong></del></span>
- <span class="inserted"><ins><em>information, but if</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>state orders it to get</em></ins></span> the <span
class="removed"><del><strong>server
- could save that</strong></del></span> data <span
class="removed"><del><strong>anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>and hand</em></ins></span> it
- <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span>
- <span class="inserted"><ins><em>over,</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>state can store it.</p>
+ privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made
- available</em></ins></span> to <span class="removed"><del><strong>stop
this, but any product
- could spy</strong></del></span> <span class="inserted"><ins><em>car
manufacturers, insurance companies, and others.</p>
+ available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
- <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>article,
- is not really a matter</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
- are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>should be replaced with
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>matter of
proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but the invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the
car.</p></em></ins></span>
+ other cases mentioned are done by proprietary malware in the car.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVR">Virtual Reality</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVR">#SpywareInVR</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVR">Virtual Reality</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>— even what their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p>
- </li>
-
- <li><p>Modern gratis game cr…apps</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008182">
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require</em></ins></span>
- users <span class="removed"><del><strong>and their users'
- friends and associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
- companies.</p>
-
- <p>They use this data to manipulate people</strong></del></span>
to <span class="removed"><del><strong>buy things, and hunt
- for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
- also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ <p>Oculus headsets <a
+
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ users to identify themselves to Facebook</a>. This will give Facebook
free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
</li>
@@ -3499,7 +3520,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 17:32:41 $
+$Date: 2020/11/10 17:37:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.345
retrieving revision 1.346
diff -u -b -r1.345 -r1.346
--- proprietary/po/proprietary-surveillance.ja.po 2 Nov 2020 17:32:41
-0000 1.345
+++ proprietary/po/proprietary-surveillance.ja.po 10 Nov 2020 17:37:44
-0000 1.346
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -114,7 +114,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "ãã©ããã£ã¦ãããããç¬ã ã¨ããã£ããã ãã?ã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -123,7 +123,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary/po/proprietary-surveillance.pot 2 Nov 2020 17:32:41 -0000
1.284
+++ proprietary/po/proprietary-surveillance.pot 10 Nov 2020 17:37:44 -0000
1.285
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -82,7 +82,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -91,7 +91,7 @@
"whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary/po/proprietary-surveillance.ru-en.html 2 Nov 2020 18:03:09
-0000 1.229
+++ proprietary/po/proprietary-surveillance.ru-en.html 10 Nov 2020 17:37:44
-0000 1.230
@@ -75,7 +75,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A common malicious functionality is to snoop on the user. This page
records <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>. Manufacturers even refuse
@@ -87,7 +87,7 @@
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
Tethers</a>.</p>
-</div>
+</blockquote>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -2771,7 +2771,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 18:03:09 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.642
retrieving revision 1.643
diff -u -b -r1.642 -r1.643
--- proprietary/po/proprietary-surveillance.ru.po 2 Nov 2020 18:03:09
-0000 1.642
+++ proprietary/po/proprietary-surveillance.ru.po 10 Nov 2020 17:37:44
-0000 1.643
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 17:25+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -94,7 +94,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "“ÐÑкÑда они Ñзнали, ÑÑо Ñ
Ñобака?”"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -109,7 +109,7 @@
"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
"\">говоÑиÑÑ, ÑпионÑÑ Ð»Ð¸ они за
полÑзоваÑелÑми в полÑÐ·Ñ Ð³Ð¾ÑÑдаÑÑÑва</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
Index: proprietary/po/proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-tethers.de-diff.html 17 Oct 2020 08:05:10
-0000 1.31
+++ proprietary/po/proprietary-tethers.de-diff.html 10 Nov 2020 17:37:44
-0000 1.32
@@ -67,7 +67,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>Tethering a product or program <span class="inserted"><ins><em>means
designing it</em></ins></span> to <span class="inserted"><ins><em>work only by
communicating with</em></ins></span> a specific <span
class="removed"><del><strong>server</strong></del></span> <span
class="inserted"><ins><em>server. That</em></ins></span> is <span
class="inserted"><ins><em>always</em></ins></span> an injustice
<span class="inserted"><ins><em>since it means you can't use the program
without that server. It is
@@ -77,7 +77,7 @@
<p>In some cases, tethering is used to do specific nasty things to the
users.</em></ins></span> This page reports instances where tethering was used
to harm
the users directly.</p>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -167,12 +167,10 @@
to Tesco's server for reinstalling default settings. Tesco <a
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix">
turned off the server for old models</a>, so now if you try to
- reinstall the default settings, it bricks them
instead.</p></em></ins></span>
+ reinstall the default settings, it bricks them instead.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809260">
+ <li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
all the nasty characteristics of such devices: <a
@@ -183,10 +181,12 @@
<p>In addition, setting the desired temperature requires running
nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
+ using controls right on the thermostat.</p></em></ins></span>
</li>
- <li id="M201807050"></em></ins></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807050"></em></ins></span>
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
@@ -399,7 +399,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-tethers.de.po 17 Oct 2020 08:05:10 -0000
1.43
+++ proprietary/po/proprietary-tethers.de.po 10 Nov 2020 17:37:44 -0000
1.44
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -120,7 +120,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -128,7 +128,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | [-Tethering a product or program-]{+In some cases, tethering is used+} to
# | [-a-] {+do+} specific [-server is an injustice in itself.-] {+nasty things
# | to the users.+} This page reports instances where tethering was used to
Index: proprietary/po/proprietary-tethers.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-tethers.es-en.html 19 Oct 2020 09:00:51
-0000 1.10
+++ proprietary/po/proprietary-tethers.es-en.html 10 Nov 2020 17:37:44
-0000 1.11
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Tethering a product or program means designing it to work only by
communicating with a specific server. That is always an injustice
since it means you can't use the program without that server. It is
@@ -63,7 +63,7 @@
<p>In some cases, tethering is used to do specific nasty things to the
users. This page reports instances where tethering was used to harm
the users directly.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 09:00:51 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tethers.es.po 19 Oct 2020 08:54:59 -0000
1.24
+++ proprietary/po/proprietary-tethers.es.po 10 Nov 2020 17:37:44 -0000
1.25
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-19 10:53+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -96,7 +96,7 @@
"programa sin ese servidor. Se produce también una injusticia secundaria si "
"no es posible comunicarse con el servidor de otra manera."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-tethers.fr-en.html 17 Oct 2020 08:59:36
-0000 1.40
+++ proprietary/po/proprietary-tethers.fr-en.html 10 Nov 2020 17:37:44
-0000 1.41
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Tethering a product or program means designing it to work only by
communicating with a specific server. That is always an injustice
since it means you can't use the program without that server. It is
@@ -63,7 +63,7 @@
<p>In some cases, tethering is used to do specific nasty things to the
users. This page reports instances where tethering was used to harm
the users directly.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:59:36 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/proprietary-tethers.fr.po 17 Oct 2020 08:29:20 -0000
1.81
+++ proprietary/po/proprietary-tethers.fr.po 10 Nov 2020 17:37:44 -0000
1.82
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -75,7 +75,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -89,7 +89,7 @@
"également une injustice secondaire si on ne peut pas communiquer avec le "
"serveur d'une autre manière."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary-tethers.ja-diff.html 17 Oct 2020 08:05:10
-0000 1.51
+++ proprietary/po/proprietary-tethers.ja-diff.html 10 Nov 2020 17:37:44
-0000 1.52
@@ -68,7 +68,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Tethering a product or program means designing it to work only by
communicating with a specific server. That is always an injustice
since it means you can't use the program without that server. It is
@@ -78,7 +78,7 @@
<p>In some cases, tethering is used to do specific nasty things to the
users. This page reports instances where tethering was used to harm
the users directly.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -389,7 +389,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-tethers.ja.po 17 Oct 2020 08:05:10 -0000
1.42
+++ proprietary/po/proprietary-tethers.ja.po 10 Nov 2020 17:37:44 -0000
1.43
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -108,7 +108,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-tethers.pot 17 Oct 2020 08:05:10 -0000
1.39
+++ proprietary/po/proprietary-tethers.pot 10 Nov 2020 17:37:44 -0000
1.40
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -76,7 +76,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tethers.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-tethers.pt-br-diff.html 17 Oct 2020 08:05:10
-0000 1.2
+++ proprietary/po/proprietary-tethers.pt-br-diff.html 10 Nov 2020 17:37:44
-0000 1.3
@@ -65,7 +65,8 @@
</div>
<div class="article">
-<div class="italic">
+<span class="removed"><del><strong><div
class="italic"></strong></del></span>
+<span class="inserted"><ins><em><blockquote></em></ins></span>
<p>Tethering a product or program means designing it to work only by
communicating with a specific server. That is always an injustice
since it means you can't use the program without that server. It is
@@ -75,7 +76,8 @@
<p>In some cases, tethering is used to do specific nasty things to the
users. This page reports instances where tethering was used to harm
the users directly.</p>
-</div>
+<span class="removed"><del><strong></div></strong></del></span>
+<span class="inserted"><ins><em></blockquote></em></ins></span>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -361,7 +363,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-tethers.pt-br.po 17 Oct 2020 08:05:10 -0000
1.34
+++ proprietary/po/proprietary-tethers.pt-br.po 10 Nov 2020 17:37:44 -0000
1.35
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-06-30 08:28-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -78,7 +78,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -91,7 +91,7 @@
"servidor. Também é uma injustiça secundária se você não puder se
comunicar "
"com o servidor de outra maneira."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-tethers.ru-en.html 19 Oct 2020 10:00:05
-0000 1.39
+++ proprietary/po/proprietary-tethers.ru-en.html 10 Nov 2020 17:37:44
-0000 1.40
@@ -53,7 +53,7 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>Tethering a product or program means designing it to work only by
communicating with a specific server. That is always an injustice
since it means you can't use the program without that server. It is
@@ -63,7 +63,7 @@
<p>In some cases, tethering is used to do specific nasty things to the
users. This page reports instances where tethering was used to harm
the users directly.</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -348,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/19 10:00:05 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary/po/proprietary-tethers.ru.po 19 Oct 2020 10:00:05 -0000
1.86
+++ proprietary/po/proprietary-tethers.ru.po 10 Nov 2020 17:37:44 -0000
1.87
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -92,7 +92,7 @@
"пÑогÑаммой без ÑÑого ÑеÑвеÑа. ÐÑли Ð²Ñ Ð½Ðµ
можеÑе ÑвÑзÑваÑÑÑÑ Ñ ÑÑим ÑеÑвеÑом "
"по-дÑÑгомÑ, Ñо ÑÑо Ñоже неÑпÑаведливо."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
Index: proprietary/po/proprietary-tyrants.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-tyrants.de-diff.html 24 Jun 2020 05:37:13
-0000 1.21
+++ proprietary/po/proprietary-tyrants.de-diff.html 10 Nov 2020 17:37:44
-0000 1.22
@@ -66,14 +66,14 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>A <em>tyrant</em> <span
class="removed"><del><strong>device</strong></del></span> is <span
class="removed"><del><strong>one</strong></del></span> <span
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to
allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
other than the “approved” system versions. We also
refer to this practice as <em>tivoization</em>.
</p>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -257,7 +257,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.de.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-tyrants.de.po 24 Jun 2020 05:37:13 -0000
1.47
+++ proprietary/po/proprietary-tyrants.de.po 10 Nov 2020 17:37:44 -0000
1.48
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -123,7 +123,7 @@
msgstr "Dies erfolgt in der Regel in Form von böswilligen Funktionalitäten."
# 'tyrant' als 'tyrannical' übersetzt -> liest sich flüssiger
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
# | refuses to allow users to install a different operating system or a
# | modified operating system. These devices have measures to block execution
Index: proprietary/po/proprietary-tyrants.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.es-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-tyrants.es-en.html 24 Jun 2020 05:37:13
-0000 1.25
+++ proprietary/po/proprietary-tyrants.es-en.html 10 Nov 2020 17:37:44
-0000 1.26
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A <em>tyrant</em> is a malicious device that refuses to allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
other than the “approved” system versions. We also
refer to this practice as <em>tivoization</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.es.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-tyrants.es.po 24 Jun 2020 05:37:13 -0000
1.53
+++ proprietary/po/proprietary-tyrants.es.po 10 Nov 2020 17:37:44 -0000
1.54
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-02-07 13:10+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -83,7 +83,7 @@
msgstr ""
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.fr-en.html 24 Jun 2020 05:37:13
-0000 1.28
+++ proprietary/po/proprietary-tyrants.fr-en.html 10 Nov 2020 17:37:44
-0000 1.29
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A <em>tyrant</em> is a malicious device that refuses to allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
other than the “approved” system versions. We also
refer to this practice as <em>tivoization</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-tyrants.fr.po 5 Oct 2020 13:13:25 -0000
1.48
+++ proprietary/po/proprietary-tyrants.fr.po 10 Nov 2020 17:37:44 -0000
1.49
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-02-07 10:01+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -78,7 +78,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/proprietary-tyrants.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.it-diff.html 24 Jun 2020 05:37:13
-0000 1.28
+++ proprietary/po/proprietary-tyrants.it-diff.html 10 Nov 2020 17:37:44
-0000 1.29
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>A <em>tyrant</em> <span
class="removed"><del><strong>device</strong></del></span> is <span
class="removed"><del><strong>one</strong></del></span> <span
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to
allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
@@ -77,7 +77,7 @@
<span class="removed"><del><strong><ul>
<li>
<p>Some LG TVs</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -258,7 +258,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary-tyrants.it.po 24 Jun 2020 05:37:13 -0000
1.44
+++ proprietary/po/proprietary-tyrants.it.po 10 Nov 2020 17:37:44 -0000
1.45
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-04-02 12:25+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -117,7 +117,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
# | A <em>tyrant</em> [-device-] is [-one-] {+a malicious device+} that
# | refuses to allow users to install a different operating system or a
# | modified operating system. These devices have measures to block execution
Index: proprietary/po/proprietary-tyrants.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-tyrants.ja-diff.html 31 Jul 2020 03:03:45
-0000 1.30
+++ proprietary/po/proprietary-tyrants.ja-diff.html 10 Nov 2020 17:37:44
-0000 1.31
@@ -66,7 +66,7 @@
</div>
<div class="article">
-<div class="italic"></em></ins></span>
+<blockquote></em></ins></span>
<p>A <em>tyrant</em> <span
class="removed"><del><strong>device</strong></del></span> is <span
class="removed"><del><strong>one</strong></del></span> <span
class="inserted"><ins><em>a malicious device</em></ins></span> that refuses to
allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
@@ -77,7 +77,7 @@
<span class="removed"><del><strong><ul>
<li>
<p>Some LG TVs</strong></del></span>
-<span class="inserted"><ins><em></div>
+<span class="inserted"><ins><em></blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -258,7 +258,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/31 03:03:45 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-tyrants.ja.po 24 Jun 2020 05:37:13 -0000
1.47
+++ proprietary/po/proprietary-tyrants.ja.po 10 Nov 2020 17:37:44 -0000
1.48
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:09+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,7 +100,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "ããã¯å
¸åçã«æªæããæ©è½ã®å½¢ãåãã¾ãã"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "A <em>tyrant</em> device is one that refuses to allow users to install a "
Index: proprietary/po/proprietary-tyrants.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pot,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tyrants.pot 24 Jun 2020 05:37:13 -0000
1.24
+++ proprietary/po/proprietary-tyrants.pot 10 Nov 2020 17:37:44 -0000
1.25
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -68,7 +68,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/proprietary-tyrants.pt-br-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pt-br-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-tyrants.pt-br-en.html 24 Jun 2020 05:37:13
-0000 1.5
+++ proprietary/po/proprietary-tyrants.pt-br-en.html 10 Nov 2020 17:37:44
-0000 1.6
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A <em>tyrant</em> is a malicious device that refuses to allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
other than the “approved” system versions. We also
refer to this practice as <em>tivoization</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.pt-br.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-tyrants.pt-br.po 24 Jun 2020 05:02:40 -0000
1.13
+++ proprietary/po/proprietary-tyrants.pt-br.po 10 Nov 2020 17:37:44 -0000
1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tyrants.html\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-02-06 21:14-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -77,7 +77,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-tyrants.ru-en.html 24 Jun 2020 05:37:13
-0000 1.28
+++ proprietary/po/proprietary-tyrants.ru-en.html 10 Nov 2020 17:37:44
-0000 1.29
@@ -52,14 +52,14 @@
</div>
<div class="article">
-<div class="italic">
+<blockquote>
<p>A <em>tyrant</em> is a malicious device that refuses to allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
other than the “approved” system versions. We also
refer to this practice as <em>tivoization</em>.
</p>
-</div>
+</blockquote>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:13 $
+$Date: 2020/11/10 17:37:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-tyrants.ru.po 24 Jun 2020 05:04:03 -0000
1.70
+++ proprietary/po/proprietary-tyrants.ru.po 10 Nov 2020 17:37:44 -0000
1.71
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 14:10+0200\n"
+"POT-Creation-Date: 2020-11-10 17:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -79,7 +79,7 @@
msgid "This typically takes the form of malicious functionalities."
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary/po/pt-br.po 10 Nov 2020 16:02:03 -0000 1.294
+++ proprietary/po/pt-br.po 10 Nov 2020 17:37:44 -0000 1.295
@@ -3519,7 +3519,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -5329,14 +5329,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -6891,7 +6891,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -7100,7 +7100,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -7235,7 +7235,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -7631,7 +7631,7 @@
msgid "Proprietary Back Doors"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -7913,7 +7913,7 @@
msgid "Proprietary Censorship"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -7922,7 +7922,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -7969,7 +7969,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -7994,7 +7994,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -8080,7 +8080,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -8088,7 +8088,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -8169,7 +8169,7 @@
msgid "Proprietary Fraud"
msgstr "Tiranos proprietários"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -8197,13 +8197,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -8211,7 +8211,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -8219,7 +8219,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -8227,7 +8227,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -8256,7 +8256,7 @@
msgid "Proprietary Insecurity"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -8265,7 +8265,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -8374,7 +8374,7 @@
msgid "Proprietary Interference"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -8433,7 +8433,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -8441,14 +8441,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -8492,14 +8492,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -8518,13 +8518,13 @@
msgid "Proprietary Obsolescence"
msgstr "Amarração proprietária"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -8532,7 +8532,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -8936,7 +8936,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -9066,7 +9066,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -9076,7 +9076,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -9106,7 +9106,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -9115,7 +9115,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -9895,7 +9895,7 @@
msgid "Proprietary Tethers"
msgstr "Amarração proprietária"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -9908,7 +9908,7 @@
"servidor. Também é uma injustiça secundária se você não puder se
comunicar "
"com o servidor de outra maneira."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "Tethering a product or program to a specific server is an injustice in "
@@ -9933,7 +9933,7 @@
msgid "Proprietary Tyrants"
msgstr "Tiranos proprietários"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
#, fuzzy
#| msgid ""
#| "A <em>tyrant</em> device is one that refuses to allow users to install a "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- proprietary/po/ru.po 10 Nov 2020 16:02:04 -0000 1.503
+++ proprietary/po/ru.po 10 Nov 2020 17:37:44 -0000 1.504
@@ -4302,7 +4302,7 @@
msgid "Malware in Games"
msgstr "ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² игÑаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -6613,7 +6613,7 @@
msgid "Malware in Mobile Devices"
msgstr "ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
@@ -6623,7 +6623,7 @@
"полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¸ пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ.
ÐÐ¾Ñ "
"поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -8538,7 +8538,7 @@
msgid "Malware in Webpages"
msgstr "ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° ÑÑÑаниÑаÑ
ÑайÑов"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -8797,7 +8797,7 @@
msgid "Potential Malware"
msgstr "ÐоÑенÑиалÑнÑе вÑедоноÑнÑе пÑогÑаммÑ"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -8951,7 +8951,7 @@
msgid "Proprietary Addictions"
msgstr "ÐавиÑимоÑÑÑ Ð¾Ñ Ð½ÐµÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -9305,7 +9305,7 @@
msgid "Proprietary Back Doors"
msgstr "Ðазейки в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -9635,7 +9635,7 @@
msgid "Proprietary Censorship"
msgstr "ЦензÑÑа в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -9649,7 +9649,7 @@
"коÑоÑÑе подвеÑгаÑÑ ÑензÑÑе ÑÑÑановкÑ</a>
пÑикладнÑÑ
пÑогÑамм (Ð¼Ñ Ð½Ð°Ð·Ñваем "
"ÑÑо “ÑÑÑÑмами”)."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -9705,7 +9705,7 @@
msgid "Proprietary Coverups"
msgstr "УÑайки в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -9737,7 +9737,7 @@
msgid "Proprietary Deception"
msgstr "Ðбман в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -9831,7 +9831,7 @@
msgid "Proprietary DRM"
msgstr "ЦиÑÑовое ÑпÑавление огÑаниÑениÑми в
неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -9843,7 +9843,7 @@
"огÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо могÑÑ Ð´ÐµÐ»Ð°ÑÑ
полÑзоваÑели. ÐÑи ÑÑнкÑии назÑваÑÑÑÑ "
"Ñакже <em>ÑиÑÑовÑми наÑÑÑниками</em>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -9962,7 +9962,7 @@
msgid "Proprietary Fraud"
msgstr "ÐоÑенниÑеÑÑво в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -9992,7 +9992,7 @@
msgid "Proprietary Incompatibility"
msgstr "ÐеÑовмеÑÑимоÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
@@ -10001,7 +10001,7 @@
"пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¿ÑогÑаммами ÑÑеÑÑиÑ
ÑÑоÑон,
коÑоÑÑе ÑабоÑаÑÑ Ñ Ñеми же Ñипами "
"даннÑÑ
."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -10014,7 +10014,7 @@
"ÑвободнÑе пÑогÑаммÑ, коÑоÑÑе могÑÑ
оÑвободиÑÑ ÑÑÑÑойÑÑво, на коÑоÑом "
"ÑабоÑаÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -10026,7 +10026,7 @@
"даннÑÑ
ÑÑÐ°Ð½ÐµÑ Ð²ÐµÑÑма заÑÑÑдниÑелÑнÑм,
еÑли поддеÑжка неÑвободнÑÑ
пÑогÑамм, "
"коÑоÑÑе могÑÑ Ð¸Ñ
ÑиÑаÑÑ, пÑекÑаÑиÑÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -10038,7 +10038,7 @@
"заÑÑÑднÑеÑÑÑ Ð¸Ð»Ð¸ замедлÑеÑÑÑ, ÑÑо ее
можно пÑовеÑÑи ÑолÑко над неболÑÑим "
"колиÑеÑÑвом даннÑÑ
."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -10066,7 +10066,7 @@
msgid "Proprietary Insecurity"
msgstr "УÑзвимоÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -10081,7 +10081,7 @@
"ÑообÑаем о ниÑ
, ÑÑÐ¾Ð±Ñ Ð¿Ð¾ÐºÐ°Ð·Ð°ÑÑ, ÑÑо
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ иÑклÑÑаÑÑ "
"оÑибки, и ÑаÑÑо веÑÑма гÑÑбÑе."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -10231,7 +10231,7 @@
msgid "Proprietary Interference"
msgstr "ÐомеÑ
и Ð¾Ñ Ð½ÐµÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -10306,7 +10306,7 @@
msgid "Proprietary Jails"
msgstr "ÐеÑвободнÑе ÑиÑÑемÑ-ÑÑÑÑмÑ"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -10318,7 +10318,7 @@
"Ð¼Ð¾Ð¶ÐµÑ ÑÑÑанавливаÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ. <a
href=\"http://i.imgur.com/ZRViDum.jpg"
"\">ÐзобÑажение ай-ÑÑÑÑмÑ</a> иллÑÑÑÑиÑÑеÑ
ÑÑÑ Ð¿ÑоблемÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
@@ -10328,7 +10328,7 @@
"владеÑÑей ÑиÑÑемой. ÐÑодажа пÑодÑкÑов,
ÑпÑоекÑиÑованнÑÑ
как плаÑÑоÑÐ¼Ñ Ð´Ð»Ñ "
"Ð½Ð°Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹ ÑензÑÑÑ, должна бÑÑÑ
запÑеÑена законом."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -10375,7 +10375,7 @@
msgid "Proprietary Manipulation"
msgstr "ÐанипÑлÑÑÐ¸Ñ Ð² неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
@@ -10385,7 +10385,7 @@
"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð¿ÑогÑамм, ÑпÑоекÑиÑованнÑÑ
,
ÑÑÐ¾Ð±Ñ Ð´ÐµÐ»Ð°ÑÑ ÑÑо, опиÑаÑÑÑ Ð½Ð° "
"ÑеловеÑеÑкÑÑ Ð¿ÑиÑ
ологиÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -10405,7 +10405,7 @@
msgid "Proprietary Obsolescence"
msgstr "УÑÑаÑевание неÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
@@ -10413,7 +10413,7 @@
"ÐапÑогÑаммиÑованное
ÑÑÑаÑевание —одна из вÑедоноÑнÑÑ
ÑÑнкÑий, "
"коÑоÑÑе могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð²
неÑвободнÑе пÑогÑаммÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -10427,7 +10427,7 @@
"пÑиÑ
одиÑÑÑ Ð²ÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ
аппаÑаÑÑÑÑ, коÑоÑÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ бÑло Ð±Ñ "
"поÑиниÑÑ."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -10826,7 +10826,7 @@
msgid "Proprietary Sabotage"
msgstr "СабоÑаж неÑвободнÑÑ
пÑогÑамм"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -10990,7 +10990,7 @@
msgid "Proprietary Subscriptions"
msgstr "РабоÑа неÑвободнÑÑ
пÑогÑамм по
подпиÑке"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -11005,7 +11005,7 @@
"proprietary/proprietary-tethers.html#about-page\">пÑивÑзана к
ÑеÑвеÑÑ</a>, а "
"ÑеÑÐ²ÐµÑ Ð¿ÑовеÑÑÐµÑ Ð´Ð°ÑÑ. Ð Ñо, и дÑÑгое
ÑвлÑеÑÑÑ Ð²ÑедоноÑной ÑÑнкÑией."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -11038,7 +11038,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr "“ÐÑкÑда они Ñзнали, ÑÑо Ñ
Ñобака?”"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -11053,7 +11053,7 @@
"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
"\">говоÑиÑÑ, ÑпионÑÑ Ð»Ð¸ они за
полÑзоваÑелÑми в полÑÐ·Ñ Ð³Ð¾ÑÑдаÑÑÑва</a>."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -11960,7 +11960,7 @@
msgid "Proprietary Tethers"
msgstr "ÐÑивÑзка в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -11973,7 +11973,7 @@
"пÑогÑаммой без ÑÑого ÑеÑвеÑа. ÐÑли Ð²Ñ Ð½Ðµ
можеÑе ÑвÑзÑваÑÑÑÑ Ñ ÑÑим ÑеÑвеÑом "
"по-дÑÑгомÑ, Ñо ÑÑо Ñоже неÑпÑаведливо."
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -11993,7 +11993,7 @@
msgid "Proprietary Tyrants"
msgstr "ÐеÑвободнÑе ÑиÑÑемÑ-ÑиÑанÑ"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/tr.po 10 Nov 2020 16:02:06 -0000 1.76
+++ proprietary/po/tr.po 10 Nov 2020 17:37:44 -0000 1.77
@@ -3111,7 +3111,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4747,14 +4747,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -6073,7 +6073,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6248,7 +6248,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -6352,7 +6352,7 @@
msgid "Proprietary Addictions"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -6713,7 +6713,7 @@
msgid "Proprietary Back Doors"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -6954,7 +6954,7 @@
msgid "Proprietary Censorship"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -6963,7 +6963,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -7012,7 +7012,7 @@
msgid "Proprietary Coverups"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -7039,7 +7039,7 @@
msgid "Proprietary Deception"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -7103,7 +7103,7 @@
msgid "Proprietary DRM"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -7111,7 +7111,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -7192,7 +7192,7 @@
msgid "Proprietary Fraud"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -7218,13 +7218,13 @@
msgid "Proprietary Incompatibility"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -7232,7 +7232,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -7240,7 +7240,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -7248,7 +7248,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7275,7 +7275,7 @@
msgid "Proprietary Insecurity"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7284,7 +7284,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7391,7 +7391,7 @@
msgid "Proprietary Interference"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -7454,7 +7454,7 @@
msgid "Proprietary Jails"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -7462,14 +7462,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -7513,14 +7513,14 @@
msgid "Proprietary Manipulation"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7539,13 +7539,13 @@
msgid "Proprietary Obsolescence"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -7553,7 +7553,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -7947,7 +7947,7 @@
msgid "Proprietary Sabotage"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -8073,7 +8073,7 @@
msgid "Proprietary Subscriptions"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -8083,7 +8083,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -8115,7 +8115,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -8124,7 +8124,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -8871,7 +8871,7 @@
msgid "Proprietary Tethers"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -8879,7 +8879,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -8898,7 +8898,7 @@
msgid "Proprietary Tyrants"
msgstr "Ãzel Mülk BaÄımlılıklar"
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/zh-cn.po 10 Nov 2020 16:02:07 -0000 1.72
+++ proprietary/po/zh-cn.po 10 Nov 2020 17:37:44 -0000 1.73
@@ -3096,7 +3096,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4670,14 +4670,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -5970,7 +5970,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6149,7 +6149,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -6255,7 +6255,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -6513,7 +6513,7 @@
msgid "Proprietary Back Doors"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -6756,7 +6756,7 @@
msgid "Proprietary Censorship"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -6765,7 +6765,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -6812,7 +6812,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -6837,7 +6837,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -6899,7 +6899,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6907,7 +6907,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6986,7 +6986,7 @@
msgid "Proprietary Fraud"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -7010,13 +7010,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -7024,7 +7024,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -7032,7 +7032,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -7040,7 +7040,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7069,7 +7069,7 @@
msgid "Proprietary Insecurity"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7078,7 +7078,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7187,7 +7187,7 @@
msgid "Proprietary Interference"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -7244,7 +7244,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -7252,14 +7252,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -7301,14 +7301,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7325,13 +7325,13 @@
msgid "Proprietary Obsolescence"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -7339,7 +7339,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -7711,7 +7711,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -7834,7 +7834,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -7844,7 +7844,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -7874,7 +7874,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -7883,7 +7883,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -8620,7 +8620,7 @@
msgid "Proprietary Tethers"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -8628,7 +8628,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -8645,7 +8645,7 @@
msgid "Proprietary Tyrants"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/zh-tw.po 10 Nov 2020 16:02:07 -0000 1.230
+++ proprietary/po/zh-tw.po 10 Nov 2020 17:37:44 -0000 1.231
@@ -3127,7 +3127,7 @@
msgid "Malware in Games"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Among the numerous malicious functionalities that are found in games, <a "
"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
@@ -4668,14 +4668,14 @@
msgid "Malware in Mobile Devices"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Nearly all mobile phones do two grievous wrongs to their users: tracking "
"their movements, and listening to their conversations. This is why we call "
"them “Stalin's dream”."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The malware we list here is present in every phone, or in software that is "
"not made by Apple or Google (including its subsidiaries). Malicious "
@@ -5941,7 +5941,7 @@
msgid "Malware in Webpages"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists web sites containing proprietary JavaScript programs that "
"spy on users or mislead them. They make use of what we call the <a href=\"/"
@@ -6123,7 +6123,7 @@
msgid "Potential Malware"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page describes malicious techniques that proprietary software might use "
"in the future for malicious purposes. We don't have any evidence that they "
@@ -6231,7 +6231,7 @@
msgid "Proprietary Addictions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page deals with malicious functionalities that are added to some "
"programs for the sole purpose of luring users into more and more frequent "
@@ -6489,7 +6489,7 @@
msgid "Proprietary Back Doors"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
@@ -6746,7 +6746,7 @@
msgid "Proprietary Censorship"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality is censorship of what users can access. "
"Here are examples of programs which do this. We have a <a href=\"/"
@@ -6755,7 +6755,7 @@
"“jails”)."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Selling products designed as platforms for a company to impose censorship "
"ought to be forbidden by law, but it isn't."
@@ -6804,7 +6804,7 @@
msgid "Proprietary Coverups"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists instances where proprietary software had a bug, and the "
"developers converted it into a malicious functionality by trying to cover up "
@@ -6831,7 +6831,7 @@
msgid "Proprietary Deception"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Deception is a malicious functionality that makes the program dishonest or "
"conceals trickery. Here are examples of such malicious functionalities. "
@@ -6894,7 +6894,7 @@
msgid "Proprietary DRM"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs and systems that implement "
"<em>digital restrictions management</em> (DRM): functionalities designed "
@@ -6902,7 +6902,7 @@
"called <em>digital handcuffs</em>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"DRM is reinforced by <a href=\"http://www.theguardian.com/technology/"
"blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "
@@ -6982,7 +6982,7 @@
msgid "Proprietary Fraud"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are some examples of proprietary software that defrauds users—"
"taking their money by trickery."
@@ -7008,13 +7008,13 @@
msgid "Proprietary Incompatibility"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One of these malicious functionalities is the deliberate incompatibility of "
"a program with third party software that operates on the same data types."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A fairly common sort of incompatibility is the use of secret formats or "
"protocols. This directly blocks or hinders users from switching to any other "
@@ -7022,7 +7022,7 @@
"liberate the device the software runs on."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Apart from being deliberately anticompetitive, secret formats put users' "
"digital data at risk. For instance, retrieval of old data will become very "
@@ -7030,7 +7030,7 @@
"discontinued."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Another sort of incompatibility occurs when a system makes some important "
"operation which would be necessary for migrating data to any other system so "
@@ -7038,7 +7038,7 @@
"data."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"More generally, the major tech companies tend to impose <a href=\"https://"
"www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-"
@@ -7071,7 +7071,7 @@
msgid "Proprietary Insecurity"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
@@ -7080,7 +7080,7 @@
"software is not immune to bugs, and is often quite sloppy."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All complex programs, whether free or proprietary, contain bugs. What makes "
"bugs more dangerous in proprietary software is that users are <em>helpless "
@@ -7193,7 +7193,7 @@
msgid "Proprietary Interference"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"One kind of malicious functionality mediates developer's interference into "
"the use of the software. This page describes how various proprietary "
@@ -7245,7 +7245,7 @@
msgid "Proprietary Jails"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"The “jails” are malicious operating systems that are designed to "
"impose censorship of which applications the user can install. The <a href="
@@ -7253,14 +7253,14 @@
"issue."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"These systems are platforms for censorship imposed by the company that owns "
"the system. Selling products designed as platforms for a company to impose "
"censorship ought to be forbidden by law, but it isn't."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"This page lists a few jails, along with some of the methods they use to "
"censor apps, and includes specific examples of apps that were blocked using "
@@ -7307,14 +7307,14 @@
msgid "Proprietary Manipulation"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Manipulation of users is one of these malicious functionalities. Here are "
"examples of programs that are designed to do this by taking advantage of "
"human psychology."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"We have a special page for <a href=\"/proprietary/proprietary-addictions.html"
"\">Addictive programs</a>, which also take advantage of human psychology, "
@@ -7333,13 +7333,13 @@
msgid "Proprietary Obsolescence"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Programmed obsolescence is one of the malicious functionalities that may be "
"designed into proprietary software."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Computer technology inevitably has an environmental impact, but proprietary "
"software makes it worse because it is often designed to lead or pressure "
@@ -7347,7 +7347,7 @@
"discard defective hardware which could have been made repairable."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Here are examples of proprietary programs that make hardware devices "
"prematurely obsolete."
@@ -7860,7 +7860,7 @@
msgid "Proprietary Sabotage"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Some malicious functionalities mediate sabotage, i.e. abusive interference "
"of the developer into the use of the software, with harmful consequences for "
@@ -7975,7 +7975,7 @@
msgid "Proprietary Subscriptions"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"It sounds simple to say that a certain program “requires a "
"subscription.” What that means concretely is that it contains a time "
@@ -7985,7 +7985,7 @@
"functionality."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Examples of software subscriptions that harmed users directly are given "
"below."
@@ -8017,7 +8017,7 @@
msgid "“How did they find out I'm a dog?”"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A common malicious functionality is to snoop on the user. This page records "
"<strong>clearly established cases of proprietary software that spies on or "
@@ -8026,7 +8026,7 @@
"\">say whether they snoop on users for the state</a>."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"All appliances and applications that are tethered to a specific server are "
"snoopers by nature. We do not list them here because they have their own "
@@ -8783,7 +8783,7 @@
msgid "Proprietary Tethers"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"Tethering a product or program means designing it to work only by "
"communicating with a specific server. That is always an injustice since it "
@@ -8791,7 +8791,7 @@
"injustice if you can't communicate with the server in another way."
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"In some cases, tethering is used to do specific nasty things to the users. "
"This page reports instances where tethering was used to harm the users "
@@ -8810,7 +8810,7 @@
msgid "Proprietary Tyrants"
msgstr ""
-#. type: Content of: <div><div><div><p>
+#. type: Content of: <div><div><blockquote><p>
msgid ""
"A <em>tyrant</em> is a malicious device that refuses to allow users to "
"install a different operating system or a modified operating system. These "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www education/edu-cases-argentina-ecen.de.html ...,
GNUN <=