www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary.zh-cn.html po/propr...


From: GNUN
Subject: www/proprietary proprietary.zh-cn.html po/propr...
Date: Tue, 22 Dec 2020 20:59:41 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/12/22 20:59:41

Modified files:
        proprietary    : proprietary.zh-cn.html 
        proprietary/po : proprietary.zh-cn-en.html proprietary.zh-cn.po 
                         zh-cn.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.zh-cn.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.99&r2=1.100

Patches:
Index: proprietary.zh-cn.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.zh-cn.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary.zh-cn.html      21 Dec 2020 07:31:02 -0000      1.28
+++ proprietary.zh-cn.html      23 Dec 2020 01:59:40 -0000      1.29
@@ -161,6 +161,21 @@
 <h3 id="latest">最新添加</h3>
 
 <ul class="blurbs">
+  <li id="M202012200">
+    <p>商业破解工具能够使用麦克、摄像头和其他一些部件 <a
+href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say";>从
+iMonster 获取密码</a>。</p>
+  </li>
+
+  <li id="M202012190">
+    <p><a
+href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>某
+Zoom 高管为中国执行嗅探和审查。</a>。</p>
+
+    <p>滥用 Zoom 
的权力展示了这种权力会有多么危险。问题的æ 
¹æºä¸æ—¶ç›‘控和审查,而在于 Zoom
+有这样的权力。这种权力一部分来自于å…
¶æœåŠ¡å™¨ï¼Œä¹Ÿæœ‰ä¸€éƒ¨åˆ†æ¥è‡ªäºŽå…¶éžè‡ªç”±å®¢æˆ·ç«¯ã€‚</p>
+  </li>
+
   <li id="M202011230">
     <p>有些 Wavelink 和 JetStream wifi
 路由器带有全局后门,它们不仅
让未经授权的用户可以远程控制路由器,而且还可以控制接å…
¥ç½‘络的任何设备。有证据表明 <a
@@ -187,23 +202,6 @@
 <a
 
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>它会移除此功能</a>。我们拭目以å¾
…。</p>
   </li>
-
-  <li id="M202011120">
-    <p>苹果公司 <a
-href="https://sneak.berlin/20201112/your-computer-isnt-yours";>在å…
¶ç”µè„‘系统里部署了恶意软件,它强加监控</a>
-给用户,并把用户的计算报告到苹果公司。</p>
-
-    <p>该报告甚至是不加
密的,它们已经暴露此数据达两年之久
。该恶意软件会向苹果å…
¬å¸æ±‡æŠ¥ç”¨æˆ·ä½•æ—¶æ‰“开了哪个程序。它还给予苹果ç 
´åç”¨æˆ·è®¡ç®—的权力。</p>
-  </li>
-
-  <li id="M202011090">
-    <p>根据 FTC,制造 Zoom 视频会议软件的公司多年来一直 <a
-href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>å°±å
…¶ç‚¹å¯¹ç‚¹åŠ å¯†å‘用户撒谎</a>,至少从
-2016 年起。</p>
-
-    <p>人们可以使用尊重用户的自由程序,比如 <a 
href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a>
-或 
BigBlueButton,如果能够使用由用户自己控制的服务器就更好了。</p>
-  </li>
 </ul>
 
 </div>
@@ -284,7 +282,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/12/21 07:31:02 $
+$Date: 2020/12/23 01:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary.zh-cn-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/proprietary.zh-cn-en.html        21 Dec 2020 07:31:02 -0000      1.29
+++ po/proprietary.zh-cn-en.html        23 Dec 2020 01:59:40 -0000      1.30
@@ -174,6 +174,25 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202012200">
+    <p>Commercial crackware can <a
+    
href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say";>
+    get passwords out of an iMonster</a>, use the microphone and camera,
+    and other things.</p>
+  </li>
+
+  <li id="M202012190">
+    <p><a
+    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>
+    A Zoom executive carried out snooping and censorship for
+    China</a>.</p>
+
+    <p>This abuse of Zoom's power shows how dangerous that power is. The
+    root problem is not the surveillance and censorship, but rather the
+    power that Zoom has. It gets that power partly from the use of its
+    server, but also partly from the nonfree client program.</p>
+  </li>
+
   <li id="M202011230">
     <p>Some Wavelink and JetStream wifi routers have
     universal back doors that enable unauthenticated
@@ -212,30 +231,6 @@
     
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>it
     would remove this capability</a>. Let's hope so.</p>
   </li>
-
-  <li id="M202011120">
-    <p>Apple has <a
-    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
-    a malware in its computers that imposes surveillance</a> on users
-    and reports users' computing to Apple.</p>
-
-    <p>The reports are even unencrypted and they've been leaking this
-    data for two years already. This malware is reporting to Apple what
-    user opens what program at what time. It also gives Apple
-    power to sabotage users' computing.</p>
-  </li>
-
-  <li id="M202011090">
-    <p>According to FTC, the
-    company behind the Zoom conferencing software <a
-    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
-    lied to users about its end-to-end encryption</a> for years, at least
-    since 2016.</p>
-
-    <p>People can use free (as in freedom) programs such as <a
-    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
-    better still if installed in a server controlled by the users.</p>
-  </li>
 </ul>
 
 </div>
@@ -298,7 +293,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/12/21 07:31:02 $
+$Date: 2020/12/23 01:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- po/proprietary.zh-cn.po     23 Dec 2020 01:33:26 -0000      1.114
+++ po/proprietary.zh-cn.po     23 Dec 2020 01:59:40 -0000      1.115
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-12-21 13:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- po/zh-cn.po 22 Dec 2020 18:01:52 -0000      1.99
+++ po/zh-cn.po 23 Dec 2020 01:59:40 -0000      1.100
@@ -790,6 +790,9 @@
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
 "and camera, and other things."
 msgstr ""
+"商业破解工具能够使用麦克、摄像头和其他一些部件 <a 
href=\"https://www.";
+"theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-"
+"for-months-researchers-say\">从 iMonster 获取密码</a>。"
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -4061,6 +4064,8 @@
 "china-surveillance/\"> A Zoom executive carried out snooping and censorship "
 "for China</a>."
 msgstr ""
+"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-";
+"china-surveillance/\">某 Zoom 高管为中国执行嗅探和审查。</a>。"
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -4069,6 +4074,9 @@
 "Zoom has. It gets that power partly from the use of its server, but also "
 "partly from the nonfree client program."
 msgstr ""
+"滥用 Zoom 的权力展示了这种权力会有多么危险。问题的æ 
¹æºä¸æ—¶ç›‘控和审查,而在于 "
+"Zoom 有这样的权力。这种权力一部分来自于å…
¶æœåŠ¡å™¨ï¼Œä¹Ÿæœ‰ä¸€éƒ¨åˆ†æ¥è‡ªäºŽå…¶éžè‡ªç”±å®¢æˆ·"
+"端。"
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]