[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-games.es.html malware-m...
From: |
GNUN |
Subject: |
www/proprietary malware-games.es.html malware-m... |
Date: |
Wed, 6 Jan 2021 05:32:30 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/01/06 05:32:29
Modified files:
proprietary : malware-games.es.html malware-microsoft.es.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.es.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
malware-games.es-en.html malware-games.es.po
malware-microsoft.es-en.html
malware-microsoft.es.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.458&r2=1.459
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.366&r2=1.367
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.583&r2=1.584
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.360&r2=1.361
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.667&r2=1.668
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.423&r2=1.424
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.449&r2=1.450
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.552&r2=1.553
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.259&r2=1.260
Patches:
Index: malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-games.es.html 5 Jan 2021 11:02:23 -0000 1.15
+++ malware-games.es.html 6 Jan 2021 10:32:22 -0000 1.16
@@ -98,7 +98,7 @@
</li>
<li id="M202010210">
- <p>Loas jugadores de Minecraft <a
+ <p>Desde 2019-2020, los jugadores de Minecraft <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">se
ven obligados a migrar a los servidores de Microsoft</a>, con la consecuente
violación de su privacidad. Microsoft publica un programa que permite a los
@@ -446,7 +446,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/01/05 11:02:23 $
+$Date: 2021/01/06 10:32:22 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-microsoft.es.html 5 Jan 2021 11:02:23 -0000 1.87
+++ malware-microsoft.es.html 6 Jan 2021 10:32:22 -0000 1.88
@@ -460,7 +460,7 @@
</li>
<li id="M202010210">
- <p>Loas jugadores de Minecraft <a
+ <p>Desde 2019-2020, los jugadores de Minecraft <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">se
ven obligados a migrar a los servidores de Microsoft</a>, con la consecuente
violación de su privacidad. Microsoft publica un programa que permite a los
@@ -807,7 +807,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/01/05 11:02:23 $
+$Date: 2021/01/06 10:32:22 $
<!-- timestamp end -->
</p>
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/de.po 6 Jan 2021 03:01:37 -0000 1.259
+++ po/de.po 6 Jan 2021 10:32:22 -0000 1.260
@@ -2719,6 +2719,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -4756,10 +4768,10 @@
"sind Tyrannen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2016-] {+2016-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5857,13 +5869,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2016-] {+2016-2021+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -12699,18 +12704,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -12985,6 +12978,13 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Proprietäre Ãberwachung - GNU-Projekt - Free Software Foundation"
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- po/es.po 6 Jan 2021 03:01:39 -0000 1.370
+++ po/es.po 6 Jan 2021 10:32:22 -0000 1.371
@@ -2616,6 +2616,49 @@
msgstr "<cite>Malware</cite> en los dispositivos móviles"
#. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# |
href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy
+# | Not Included”</a> list <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+“Minimum+} Security [-Standards\".-] {+Standards.”+}
+# | Insecure design of the program running on some of these devices <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded\">“Privacy Not Included”</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/"
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
+msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+"La mayorÃa de los aparatos conectados a Internet que se encuentran en la "
+"lista de Mozilla <a href=\"https://foundation.mozilla.org/es/"
+"privacynotincluded\">«Privacidad no incluida»</a><a href=\"https://"
+"foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">están "
+"diseñados para espiar a los usuarios</a>, incluso cuando cumplen los "
+"«Estándares mÃnimos de seguridad» de Mozilla. El diseño inseguro del "
+"programa que se ejecuta en algunos de estos aparatos <a href=\"https://"
+"foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"
+"\">hace al usuario susceptible de ser espiado y también de ser presa de "
+"delincuentes informáticos</a>."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
@@ -4433,7 +4476,10 @@
"Achievements\">son tiranos</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+# | Copyright © 2016-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5651,13 +5697,6 @@
"buena parte de los datos personales</a>, incluso muchas actividades que no "
"tienen nada que ver con las trampas."
-#. type: Content of: <div><p>
-# | Copyright © 2016-202[-0-]{+1+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
# | Foundation
@@ -12945,18 +12984,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -13241,6 +13268,10 @@
"Aquà se presentan ejemplos de suscripciones de software que causan un daño "
"directo a los usuarios."
+#. type: Content of: <div><p>
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.458
retrieving revision 1.459
diff -u -b -r1.458 -r1.459
--- po/fr.po 6 Jan 2021 03:01:39 -0000 1.458
+++ po/fr.po 6 Jan 2021 10:32:22 -0000 1.459
@@ -2244,6 +2244,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -3905,8 +3917,8 @@
"des tyrans</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4968,10 +4980,6 @@
"grand nombre correspondent à des activités n'ayant rien à voir avec la "
"triche."
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -11157,18 +11165,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -11409,6 +11405,10 @@
"Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui ont
"
"fait du tort directement aux utilisateurs."
+#. type: Content of: <div><p>
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Surveillants privateurs - GNU Project - Free Software Foundation"
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/it.po 6 Jan 2021 03:01:40 -0000 1.259
+++ po/it.po 6 Jan 2021 10:32:22 -0000 1.260
@@ -2616,6 +2616,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -4434,10 +4446,10 @@
"\">sono tiranni</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014-2017-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2017-] {+2016-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5450,13 +5462,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2014-2017-] {+2016-2021+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
# | Foundation
@@ -11824,18 +11829,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -12075,6 +12068,13 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2014-2017-] {+2016-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Sorveglianza proprietaria - Progetto GNU - Free Software Foundation"
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- po/ja.po 6 Jan 2021 03:01:41 -0000 1.267
+++ po/ja.po 6 Jan 2021 10:32:24 -0000 1.268
@@ -2029,6 +2029,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -3396,7 +3408,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -4245,12 +4257,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016 Free Software Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -9285,18 +9291,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -9510,6 +9504,12 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/malware-appliances.de-diff.html 30 Dec 2020 10:33:45 -0000 1.64
+++ po/malware-appliances.de-diff.html 6 Jan 2021 10:32:24 -0000 1.65
@@ -93,45 +93,58 @@
send</strong></del></span> <span class="inserted"><ins><em>this page but
isn't
here, please write
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span> <span
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL</em></ins></span> of <span
class="removed"><del><strong>data about</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
-to serve as specific substantiation.</p>
+ lot of data about</strong></del></span> <span
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p>
+ </li>
+
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or
two</em></ins></span>
+to <span class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p>
+ <li id="M202101050">
+ <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list <a
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop on users</a> even if they meet
+ Mozilla's “Minimum Security Standards.” Insecure
+ design</em></ins></span> of the <span
class="removed"><del><strong>conversation between two users</a>.</p>
</li>
<li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>routers, but
- also any devices connected</em></ins></span> to <span
class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</strong></del></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>program running on some of these
devices</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible to be snooped and exploited</em></ins></span> by
<span class="inserted"><ins><em>crackers as
+ well</a>.</p>
</li>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span> <span
class="inserted"><ins><em>network. There</em></ins></span> is <span
class="removed"><del><strong>a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>evidence that</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability</em></ins></span> is <span
class="removed"><del><strong>an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>actively
exploited</a>.</p>
+ <li id="M202011230">
+ <p>Some Wavelink and JetStream wifi routers have
+ universal back doors that enable unauthenticated
+ users to remotely control not only</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>routers, but
+ also any devices connected to</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>network. There is evidence</em></ins></span> that
<span class="removed"><del><strong>the device</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
+ this vulnerability</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>actively exploited</a>.</p>
- <p>If you consider buying a router, we encourage you to get one
- that <a
href="https://ryf.fsf.org/categories/routers">runs</em></ins></span> on
<span class="inserted"><ins><em>free
+ <p>If you consider buying a router, we encourage
you</em></ins></span> to <span class="inserted"><ins><em>get one
+ that <a href="https://ryf.fsf.org/categories/routers">runs on free
software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by</em></ins></span>
the <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>community,
+ it (e.g., through</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> <span class="inserted"><ins><em>firmware update)
will be detected by the community,
and soon corrected.</p>
- <p>If unfortunately you own a router</em></ins></span> that <span
class="removed"><del><strong>the device is tethered</strong></del></span> <span
class="inserted"><ins><em>runs on
- proprietary software, don't panic! You may be able</em></ins></span> to
- <span class="inserted"><ins><em>replace its firmware
with</em></ins></span> a <span class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>free operating system such as <a
+ <p>If unfortunately you own a router that runs on</em></ins></span>
+ proprietary <span
class="removed"><del><strong>tethering</a>.</p>
+ <p>But</strong></del></span> <span
class="inserted"><ins><em>software, don't panic! You may be able to
+ replace its firmware with a free operating system such as <a
href="https://librecmc.org">libreCMC</a>. If you don't know how,
you can get help from a nearby GNU/Linux user group.</p>
</li>
@@ -139,14 +152,14 @@
<li id="M202007280">
<p>The Focals eyeglass display, with snooping
microphone, has been eliminated. Google eliminated
- it by buying</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer and shutting it down. It also <a
+ it by buying the manufacturer and shutting</em></ins></span> it <span
class="inserted"><ins><em>down. It</em></ins></span> also <span
class="removed"><del><strong>demonstrates that</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010">shut
- down</em></ins></span> the <span class="removed"><del><strong>company
+ down</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>server these
devices depend on</a>, which caused</em></ins></span> the <span
class="removed"><del><strong>company
surveillance capability.</p>
</li>
<li>
- <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>server these
devices depend on</a>, which caused the ones
+ <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>ones
already sold to cease to function.</p>
<p>It may be a good thing to wipe out this product—for
@@ -252,71 +265,74 @@
<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>service to control them through</a>.</p>
- <p>While it is laudable</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span
class="removed"><del><strong>done without</strong></del></span> <span
class="inserted"><ins><em>mistreating</em></ins></span>
- the <span class="removed"><del><strong>users' consent.
-If the fine print of</strong></del></span> <span
class="inserted"><ins><em>customers by doing so, this doesn't
alter</em></ins></span> the <span class="removed"><del><strong>app
said</strong></del></span> <span
class="inserted"><ins><em>facts</em></ins></span> that <span
class="removed"><del><strong>users gave consent for this,
-would</strong></del></span>
- <span class="inserted"><ins><em>tethering the device to a particular
server is a path to screwing the
- users, and</em></ins></span> that <span
class="removed"><del><strong>make</strong></del></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
+ <p>While it is laudable</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span
class="removed"><del><strong>done without the users' consent.
+If</strong></del></span> <span
class="inserted"><ins><em>mistreating</em></ins></span>
+ the <span class="removed"><del><strong>fine print of</strong></del></span>
<span class="inserted"><ins><em>customers by doing so, this doesn't
alter</em></ins></span> the <span class="removed"><del><strong>app
said</strong></del></span> <span
class="inserted"><ins><em>facts</em></ins></span> that <span
class="removed"><del><strong>users gave consent for this,
+would that make it acceptable? No way! It should be flat out
<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design</strong></del></span> <span class="inserted"><ins><em>is a
consequence of having nonfree software in</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
-</p></strong></del></span>
- <span class="inserted"><ins><em>device.</p></em></ins></span>
- </li>
+illegal to design</strong></del></span>
+ <span class="inserted"><ins><em>tethering</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p>
+</li>
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking devices with a downgrade
that</strong></del></span> <span class="inserted"><ins><em>id="M201904260">
- <p>The Jibo robot toys were</em></ins></span> tethered <span
class="inserted"><ins><em>to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made</em></ins></span> them <span
class="inserted"><ins><em>all cease to work</a> by shutting down that
+<li id="anova">
+ <p>Anova sabotaged users' cooking devices with a downgrade that
+ tethered them</strong></del></span> <span
class="inserted"><ins><em>device</em></ins></span> to a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
+ cookers won't function.</a></p>
+</li>
+
+<li>
+<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span> <span class="inserted"><ins><em>particular
server</em></ins></span> is
+<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>a path</em></ins></span> to <span
class="inserted"><ins><em>screwing</em></ins></span> the <span
class="removed"><del><strong>Internet,
+its security</strong></del></span>
+ <span class="inserted"><ins><em>users, and that it</em></ins></span> is
<span class="removed"><del><strong>crap</a>.</p>
+<p>For example,</strong></del></span> a <span
class="removed"><del><strong>cracker can gain access</strong></del></span>
<span class="inserted"><ins><em>consequence of having nonfree software in the
+ device.</p>
+ </li>
+
+ <li id="M201904260">
+ <p>The Jibo robot toys were tethered</em></ins></span> to the <span
class="removed"><del><strong>dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span
class="inserted"><ins><em>manufacturer's server,</em></ins></span>
+ and <span class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"></em></ins></span>
+ the <span class="removed"><del><strong>dishwasher</strong></del></span>
<span class="inserted"><ins><em>company made them all cease</em></ins></span>
to <span class="removed"><del><strong>launch attacks</strong></del></span>
<span class="inserted"><ins><em>work</a> by shutting down that
server.</p>
<p>The shutdown might ironically be good for their users, since the
- product was designed</em></ins></span> to <span
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a
<span class="removed"><del><strong>remote server.</strong></del></span> <span
class="inserted"><ins><em>phony
- semblance of emotions, and was most certainly spying on them.</p>
+ product was designed to manipulate people by presenting a phony
+ semblance of emotions, and was most certainly spying</em></ins></span> on
+ <span class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
+ defibrillators</a> and the</em></ins></span> devices <span
class="inserted"><ins><em>they connect to.</p>
<p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in</em></ins></span> an <span
class="removed"><del><strong>account</strong></del></span> <span
class="inserted"><ins><em>earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely</em></ins></span> on <span
class="removed"><del><strong>Anova's servers,</strong></del></span> <span
class="inserted"><ins><em>proprietary software
- developers to fix bugs in</em></ins></span> their
- <span class="removed"><del><strong>cookers won't
function.</a></p></strong></del></span> <span
class="inserted"><ins><em>products.</p></em></ins></span>
+ vulnerabilities were discovered</em></ins></span> in <span
class="inserted"><ins><em>an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span class="removed"><del><strong>network. Since these dishwashers are
used</strong></del></span> <span class="inserted"><ins><em>company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs</em></ins></span> in <span
class="removed"><del><strong>hospitals,
+ such attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>their
products.</p></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
-<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span>
+<p>If you buy a used “smart” car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span>
<span class="inserted"><ins><em><li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera</em></ins></span> is
-<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>designed so
that</em></ins></span> the <span class="removed"><del><strong>Internet,
-its security is crap</a>.</p>
-<p>For example, a cracker</strong></del></span>
- <span class="inserted"><ins><em>manufacturer (now
Amazon)</em></ins></span> can <span class="removed"><del><strong>gain access
to</strong></del></span> <span class="inserted"><ins><em>watch
all</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>time.
Now</em></ins></span> it <span class="removed"><del><strong>with
malware,</strong></del></span> <span class="inserted"><ins><em>turns out
- that <a
-
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong>force the dishwasher</strong></del></span> <span
class="inserted"><ins><em>fake videos too</a>.</p>
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else</em></ins></span> can <span class="removed"><del><strong>still
remotely control it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and Amazon will probably fix it. However, we
- do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
- other devices in</strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
- such attacks could potentially put hundreds of lives at risk.</p>
-
-</li>
-<li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>design
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -327,68 +343,68 @@
<p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable</strong></del></span> <span class="inserted"><ins><em>still
- paying for</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it</strong></del></span>
<span class="inserted"><ins><em>subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>not hidden
as</strong></del></span>
- <span class="inserted"><ins><em>paid for.</p>
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="inserted"><ins><em>constantly
+ communicates with HP servers</a> to make sure the
user</em></ins></span> is <span class="removed"><del><strong>viewed on
them,</strong></del></span> <span class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in
- <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
- working order.</p></em></ins></span>
+ specific cases, it spies on users,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by,</em></ins></span> the user's <span
class="removed"><del><strong>own
+ computer,</strong></del></span> <span class="inserted"><ins><em>front
door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at</em></ins></span> the <span class="removed"><del><strong>TV reports
what it is. The existence of a way</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has
tried</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>More or less all “smart” TVs</strong></del></span>
+<p>More or less all “smart”</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio</em></ins></span> TVs <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
-<p>The report was as of 2014, but we don't expect this has got
+<p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own
words</em></ins></span> of <span class="removed"><del><strong>2014, but we
don't expect</strong></del></span> <span class="inserted"><ins><em>the company's
+ CTO, and</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
-<p>This</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
- long-term.</p>
-
- <p>In many cases, the video</em></ins></span> shows <span
class="inserted"><ins><em>everyone</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+<p>This shows that laws requiring products</strong></del></span> <span
class="inserted"><ins><em>data is sold</em></ins></span> to <span
class="removed"><del><strong>get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span class="removed"><del><strong>TV
will say,
-“Without your consent</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
-
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at</em></ins></span> the <span class="removed"><del><strong>TV will not
+what happens if a user declines consent? Probably the TV will say,
+“Without your consent to tracking, the TV will not
work.”</p>
-<p>Proper laws would say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>videos freely. It appears Amazon has
tried</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>prevent that
- secondary abuse, but</em></ins></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
-<p>Some LG</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio</em></ins></span> TVs <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+<p>Proper laws would say that TVs are not allowed to report what the
+user watches — no exceptions!</p>
+</li>
+<li>
+<p>Some LG
+TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
tyrants</a>.</p>
</li>
<li><a
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>base
-for a tyrant system</a> so as</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own words of the
company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>impose DRM.
-What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+Samsung “Smart” TVs have turned Linux into the
base</strong></del></span> <span class="inserted"><ins><em>third parties. This
is in return</em></ins></span> for <span class="removed"><del><strong>a tyrant
system</a> so as to impose DRM.
+What enables Samsung</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>do</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="inserted"><ins><em>spying acceptable, according to him,</em></ins></span>
@@ -415,7 +431,7 @@
instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as</em></ins></span> a <span
class="removed"><del><strong>data broker,
+ firewall to block connections</em></ins></span> to <span
class="inserted"><ins><em>Vizio's servers. Or, as</em></ins></span> a <span
class="removed"><del><strong>data broker,
the data broker</strong></del></span> <span class="inserted"><ins><em>last
resort,
you</em></ins></span> can <span class="removed"><del><strong>figure out
who the user is.</p></strong></del></span> <span
class="inserted"><ins><em>replace your TV with another
model.</p></em></ins></span>
</li>
@@ -429,29 +445,29 @@
intentionally broke Revolv home automatic control products that depended
on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>server</a> to
function. The lesson is, don't stand for that! Insist
-on self-contained computers</strong></del></span> <span
class="inserted"><ins><em>better
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span
class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>better
name!</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>run free software!</p>
-</li>
-
-<li>
-<p>ARRIS cable modem has a <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor</strong></del></span> <span class="inserted"><ins><em>these
- manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't
stand</strong></del></span> <span class="inserted"><ins><em>look at what's in
the videos. That's not
+ security</em></ins></span> for <span class="removed"><del><strong>that!
Insist
+on self-contained computers that run free
software!</p></strong></del></span> <span class="inserted"><ins><em>your
home. Security means making sure they don't get to
see through your camera.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>HP “storage appliances” that use</strong></del></span>
+<p>ARRIS cable modem has a <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor in</strong></del></span>
<span class="inserted"><ins><em><li id="M201810150">
- <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span class="removed"><del><strong>proprietary
-“Left Hand” operating system have back doors that give
HP</strong></del></span>
- <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
+ <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+
+<li>
+<p>HP “storage appliances” that</strong></del></span>
+ use <span class="removed"><del><strong>the proprietary
+“Left Hand” operating system have back doors that give
HP</strong></del></span> <span class="inserted"><ins><em>of independent
replacement ink cartridges. Their “security
upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
remote login access</a> to them. HP claims that this does not
give</strong></del></span>
@@ -521,22 +537,22 @@
broken devices continued. But we think</em></ins></span> that <span
class="removed"><del><strong>article says that there was
“nothing wrong” with designing</strong></del></span> <span
class="inserted"><ins><em>is a secondary issue;
it made</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>restrict users in</strong></del></span> <span
class="inserted"><ins><em>some additional people.
- The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
-sign</strong></del></span> <span class="inserted"><ins><em>devices to
depend</em></ins></span> on <span class="removed"><del><strong>your chest. We
should know better: we should condemn all companies</strong></del></span> <span
class="inserted"><ins><em>something
- else</em></ins></span> that <span class="removed"><del><strong>take
advantage of people like him. Indeed,</strong></del></span> <span
class="inserted"><ins><em>didn't respect users' freedom.</p>
+ The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>first place. This is like
putting</strong></del></span> <span class="inserted"><ins><em>devices to depend
on something
+ else that didn't respect users' freedom.</p>
</li>
<li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
+ offers</em></ins></span> a <span class="removed"><del><strong>“cheat
me and mistreat me”
+sign</strong></del></span> <span class="inserted"><ins><em>gratis electronic
toothbrush that snoops</em></ins></span> on <span
class="removed"><del><strong>your chest. We should know better: we should
condemn all companies</strong></del></span> <span class="inserted"><ins><em>its
user by
sending usage data back over the Internet</a>.</p>
</li>
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>take advantage of people like him.
Indeed,</strong></del></span> <span class="inserted"><ins><em>install a
surveillance app</a>.</p>
<p>We link to the article for the facts</em></ins></span> it <span
class="inserted"><ins><em>presents. It</em></ins></span>
is <span class="inserted"><ins><em>too bad that</em></ins></span> the
<span class="removed"><del><strong>acceptance</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
@@ -600,205 +616,96 @@
<li>
<p>Samsung's “Smart Home”</strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
- it, the system</em></ins></span> has a <span
class="removed"><del><strong>big</strong></del></span> <span
class="inserted"><ins><em>grave</em></ins></span> security <span
class="removed"><del><strong>hole;</strong></del></span> <span
class="inserted"><ins><em>flaw.</p>
+ it, the system</em></ins></span> has a <span
class="removed"><del><strong>big</strong></del></span> <span
class="inserted"><ins><em>grave</em></ins></span> security <span
class="removed"><del><strong>hole; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people can remotely</strong></del></span> <span
class="inserted"><ins><em>flaw.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people can remotely control it</a>.</p>
-
-<p>Samsung claims that this is an “open” platform so the
-problem is partly the fault</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings</em></ins></span> of <span class="removed"><del><strong>app
developers. That is clearly true if</strong></del></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
-
-<p>Anything whose name is “Smart” is most likely going to
-screw you.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
-
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people with
surveillance—neither</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711080">
+ <li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices</em></ins></span> by <span
class="removed"><del><strong>watching people through</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>camera, nor</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> through <span
class="removed"><del><strong>malware in</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the
-<span class="removed"><del><strong>camera.</p>
-</li>
+ all Harmony Link household</em></ins></span> control <span
class="removed"><del><strong>it</a>.</p>
-<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
-attackers</strong></del></span> <span class="inserted"><ins><em>products'
supposed owners
+<p>Samsung claims that</strong></del></span> <span
class="inserted"><ins><em>devices by <a
+
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect this is</em></ins></span> to <span
class="removed"><del><strong>send malware</strong></del></span> <span
class="inserted"><ins><em>pressure them</em></ins></span> to <span
class="removed"><del><strong>the devices, which can subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>buy a newer
model. If
- they are wise, they will learn, rather,</em></ins></span> to <span
class="removed"><del><strong>computers and other FitBit
trackers</strong></del></span> <span class="inserted"><ins><em>distrust any
product</em></ins></span> that <span
class="removed"><del><strong>interact</strong></del></span>
- <span class="inserted"><ins><em>requires users to talk</em></ins></span>
with
-<span class="removed"><del><strong>them.</p></strong></del></span> <span
class="inserted"><ins><em>them through some specialized
service.</p></em></ins></span>
+ <p>The owners suspect</em></ins></span> this is <span
class="inserted"><ins><em>to pressure them to buy a newer model. If
+ they are wise, they will learn, rather, to distrust any product that
+ requires users to talk with them through some specialized
service.</p>
</li>
-<span class="removed"><del><strong><li>
-<p> “Self-encrypting” disk drives do the
encryption</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201710040">
+ <li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate</em></ins></span> with
-<span class="removed"><del><strong>proprietary firmware so you can't trust it.
Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back door</a>.</p>
-</li>
-
-<li>
-<p>
-Hospira infusion pumps, which are used to administer drugs
to</strong></del></span> <span class="inserted"><ins><em>it,
is</em></ins></span> a <span class="removed"><del><strong>patient, were rated
“<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>”</strong></del></span>
<span class="inserted"><ins><em>surveillance device. <a
+ manufacturer can communicate with it, is a surveillance device. <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
+ Canary camera is</em></ins></span> an <span
class="removed"><del><strong>“open” platform
so</strong></del></span> <span
class="inserted"><ins><em>example</a>.</p>
- <p>The article describes wrongdoing</em></ins></span> by <span
class="removed"><del><strong>a security
-researcher.</p>
-
-<p>Depending</strong></del></span> <span class="inserted"><ins><em>the
manufacturer, based</em></ins></span> on <span
class="removed"><del><strong>what drug is being infused,</strong></del></span>
- the <span class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> the <span class="removed"><del><strong>door to
murder.</p>
-</li>
-
-<li>
-<p>Due</strong></del></span> <span class="inserted"><ins><em>device is
tethered</em></ins></span> to <span class="removed"><del><strong>bad security
in</strong></del></span> a <span class="removed"><del><strong>drug pump,
crackers could use</strong></del></span> <span
class="inserted"><ins><em>server.</p>
+ <p>The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on
+ the fact that the device</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>tethered to a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</em></ins></span> it <span class="inserted"><ins><em>also
demonstrates that the device gives the company
+ <p>But it also demonstrates that</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>device gives the company
surveillance capability.</p>
</li>
<li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals is connected</em></ins></span> to <span
class="inserted"><ins><em>the internet. Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly
vulnerable</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ designed for hospitals is connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
<p><small>(Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to
-<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span
class="inserted"><ins><em>crackers.)</small></p></em></ins></span>
+ referring to crackers.)</small></p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280"></em></ins></span>
- <p>The <span class="removed"><del><strong><a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished a company for making webcams with</strong></del></span> bad <span
class="removed"><del><strong>security</a> so
-that it was easy for anyone to watch them.</p>
-</li>
-
-<li>
-<p>It is possible to <a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill people by taking control of medical implants by radio</a>. More
-information</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> in <span
class="removed"><del><strong><a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
-
-<li>
-<p>Lots</strong></del></span> <span class="inserted"><ins><em>many
Internet</em></ins></span> of <span class="inserted"><ins><em>Stings devices
allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it
can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ <li id="M201708280">
+ <p>The bad security in many Internet</em></ins></span> of <span
class="removed"><del><strong>app developers. That</strong></del></span> <span
class="inserted"><ins><em>Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
- <p>Don't</em></ins></span> be <span
class="removed"><del><strong>fatal.</p>
-</li>
+ <p>Don't be a sucker—reject all the stings.</p>
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over</a> and turned
-into</strong></del></span> a <span class="removed"><del><strong>botnet
for</strong></del></span> <span class="inserted"><ins><em>sucker—reject
all</em></ins></span> the <span class="removed"><del><strong>purpose of
collecting customers' credit card
-numbers.</p></strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
- </li>
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>clearly true if</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
- <li <span class="removed"><del><strong>id="vizio-snoop">
-<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201708230">
- <p>Sonos</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used a firmware “upgrade” to make</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
- told all</em></ins></span> its <span class="removed"><del><strong>TVs
snoop on what
-users watch</a>. The TVs did not do that when first sold.</p>
-</li>
+<p>Anything whose name</strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ </li>
-<li>
-<p>LG</strong></del></span> <span class="inserted"><ins><em>customers,
“Agree”
- to snooping or the product will stop working</a>.</em></ins></span>
<a
-<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a> on <em>previously
purchased</em>
-“smart” TVs, unless</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
- Another article</a> says they won't forcibly
change</em></ins></span> the <span class="removed"><del><strong>purchasers
agreed</strong></del></span> <span class="inserted"><ins><em>software, but
- people won't be able</em></ins></span> to <span
class="removed"><del><strong>let LG
-begin</strong></del></span> <span class="inserted"><ins><em>get any upgrades
and eventually it will
+ <li id="M201708230">
+ <p>Sonos <a
+
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ told all its customers, “Agree”
+ to snooping or the product will stop working</a>. <a
+
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
+ Another article</a> says they won't forcibly change the software, but
+ people won't be able to get any upgrades and eventually it will
stop working.</p>
</li>
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to snoop on <span class="removed"><del><strong>them and distribute their
personal data.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie</strong></del></span> <span class="inserted"><ins><em>other people,
DJI</em></ins></span> is <span class="removed"><del><strong>going to
spy</a></strong></del></span> <span class="inserted"><ins><em>in many
cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>children and
adults.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p></em></ins></span>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI</em></ins></span> is <span
class="removed"><del><strong>“Smart”</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706200">
- <p>Many models of Internet-connected cameras</em></ins></span>
- are <span class="removed"><del><strong>spying devices</a>.</p>
-</li>
-
-<li>
-<p>The</strong></del></span> <span
class="inserted"><ins><em>tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
-“smart” camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</em></ins></span>
- is <span class="removed"><del><strong>always watching</a>, even
when</strong></del></span> <span class="inserted"><ins><em>no way to delete
these accounts either</a>.</p>
+ <li id="M201706200">
+ <p>Many models of Internet-connected cameras
+ are tremendously insecure. They have login
+ accounts with hard-coded passwords, which can't be changed, and <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
</li>
<li id="M201705250">
@@ -812,8 +719,7 @@
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down</em></ins></span> the
-<span class="removed"><del><strong>“owner”
switches</strong></del></span> <span class="inserted"><ins><em>server and the
pets more or less died</a>.</p>
+ It shut down the server and the pets more or less died</a>.</p>
</li>
<li id="M201704190">
@@ -825,7 +731,7 @@
<p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that make</em></ins></span> it <span
class="removed"><del><strong>“off.”</p></strong></del></span>
<span class="inserted"><ins><em>acceptable? No way! It should be flat out <a
+ would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
@@ -851,8 +757,8 @@
lives at risk.</p>
</li>
- <li id="M201703140"></em></ins></span>
- <p>A <span class="inserted"><ins><em>computerized vibrator <a
+ <li id="M201703140">
+ <p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -1104,75 +1010,150 @@
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible to turn this off, but having it enabled by
default</em></ins></span>
+ is <span class="removed"><del><strong>most likely going to
+screw you.</p></strong></del></span> <span class="inserted"><ins><em>an
injustice already.</p></em></ins></span>
</li>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+<span class="removed"><del><strong><li>
+<p>
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+security cameras available through Amazon</a>.
+</p>
+
+<p>A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>surveillance—neither
+by watching people through</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>camera, nor
through malware in</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the
+<span class="removed"><del><strong>camera.</p>
+</li>
+
+<li>
+<p></strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
</li>
<li id="M201510210">
- <p>FitBit fitness trackers have a <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ <p>FitBit</em></ins></span> fitness trackers have a <span
class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with them.</p>
</li>
- <li id="M201510200">
- <p>“Self-encrypting” disk drives
+<span class="removed"><del><strong><li>
+<p> “Self-encrypting”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510200">
+ <p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My Passport” drives <a
-
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ can't trust it. Western Digital's <span class="removed"><del><strong><a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></strong></del></span>
“My Passport” drives <span class="inserted"><ins><em><a
+
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></em></ins></span>
have a back door</a>.</p>
</li>
- <li id="M201507240">
+<span class="removed"><del><strong><li>
+<p>
+Hospira infusion pumps, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span class="removed"><del><strong>used
to administer drugs to
+a patient, were rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>watching</a>,
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.</p>
+
+<p>Depending on what drug is being infused, the insecurity could
+open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
- <li id="M201506080">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506080"></em></ins></span>
<p>Due to bad security in a drug pump, crackers could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished a company for making webcams with bad security</a> so
+that it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs</em></ins></span> people <span
class="removed"><del><strong>by taking control of medical implants by
radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
+<a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p>
+</li>
+
+<li>
+<p>Lots of <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>, and it can be
fatal.</p></strong></del></span> <span class="inserted"><ins><em>watch,
and even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201505050">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
<p>Hospira infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over</a> and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
researcher.</p>
- <p>Depending on what drug is being infused, the insecurity could open
- the door to murder.</p>
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>insecurity could open
+ the door to murder.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201504300"></em></ins></span>
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
@@ -1224,72 +1205,90 @@
data about the user</a>.</p>
</li>
- <li id="M201405200.1">
+ <li id="M201405200.1"></em></ins></span>
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- disabled network features</a> on <em>previously
purchased</em></em></ins></span>
- “smart” <span class="removed"><del><strong>device
means</strong></del></span> <span class="inserted"><ins><em>TVs,
unless</em></ins></span> the <span class="removed"><del><strong>manufacturer is
using it</strong></del></span> <span class="inserted"><ins><em>purchasers
agreed</em></ins></span> to <span class="removed"><del><strong>outsmart
-you.</p>
-</li>
-
-<li>
-<p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
- to snoop</em></ins></span> on <span class="inserted"><ins><em>them and
distribute</em></ins></span> their <span class="removed"><del><strong>users:
their</strong></del></span> <span class="inserted"><ins><em>personal
data.</p>
+ disabled network features</a> on <em>previously
purchased</em>
+ “smart” TVs, unless the purchasers agreed to let LG begin
+ to snoop on them and distribute their personal data.</p>
</li>
- <li id="M201404250">
- <p>Lots of</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>,</em></ins></span> and
-<span class="removed"><del><strong>link them your IP address</a> so that
advertisers</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> can <span
class="removed"><del><strong>track you
-across devices.</p>
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going to spy</a> on children</strong></del></span>
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>be fatal.</p>
+ <span class="inserted"><ins><em><li id="M201404250">
+ <p>Lots of <a
+ href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>,</em></ins></span> and
<span class="removed"><del><strong>adults.</p></strong></del></span>
<span class="inserted"><ins><em>it can be fatal.</p></em></ins></span>
</li>
- <li id="M201312290">
- <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
- memories have modifiable software</a>, which makes them
vulnerable</em></ins></span>
- to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>viruses.</p>
+<span class="removed"><del><strong><li></strong></del></span>
- <p>We don't call</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>a “back door” because</em></ins></span>
it <span class="removed"><del><strong>enabled by default</strong></del></span>
is <span class="removed"><del><strong>an injustice already.</p>
+ <span class="inserted"><ins><em><li id="M201312290"></em></ins></span>
+ <p><a
+<span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP IP phones are spying devices</a>.</p>
</li>
<li>
-<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors. Tivo
-customers are unaware they're being watched by advertisers. By
-combining TV viewing information with online social media
-participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>normal
- that you</em></ins></span> can <span class="removed"><del><strong>now <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
-correlate TV advertisement with online purchases</a>, exposing all
-users to</strong></del></span> <span class="inserted"><ins><em>install
a</em></ins></span> new <span class="removed"><del><strong>combined
surveillance by default.</p>
-</li>
+<p>The <a
+href="http://www.bbc.com/news/technology-34922712">Nest Cam
+“smart” camera is always watching</a>, even when the
+“owner” switches</strong></del></span> <span
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
+ memories have modifiable software</a>, which makes them vulnerable
+ to viruses.</p>
-<li>
-<p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>system in a
computer, given physical access</em></ins></span>
- to <span class="inserted"><ins><em>it. However, memory sticks and cards
should not</em></ins></span> be <span class="removed"><del><strong>picked
-up by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>modifiable in
- this way.</p>
+ <p>We don't call this a “back door”
because</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+
+<p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>normal
+ that you can install a new system in a computer, given physical
access</em></ins></span>
+ to <span class="removed"><del><strong>outsmart
+you.</p></strong></del></span> <span class="inserted"><ins><em>it.
However, memory sticks and cards should not be modifiable in
+ this way.</p></em></ins></span>
</li>
- <li id="M201312040">
+<span class="removed"><del><strong><li>
+<p>Vizio goes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312040">
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
- Point-of-sale terminals</em></ins></span> running <span
class="inserted"><ins><em>Windows were taken over</a> and
- turned into a botnet for the purpose of collecting customers' credit
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into</em></ins></span> a <span class="removed"><del><strong>step
further than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
card numbers.</p>
</li>
<li id="M201311210">
- <p>Spyware in LG “smart” TVs <a
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>spying on
+their users: their <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>LG</em></ins></span> “smart” TVs
<span class="removed"><del><strong>analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em><a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ reports what the user watches,</em></ins></span> and
+<span class="removed"><del><strong>link them your IP address</a> so that
advertisers can track you
+across devices.</p>
+
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span
class="removed"><del><strong>off, but having it enabled by default
+is an injustice already.</p>
+</li>
+
+<li>
+<p>Tivo's alliance with Viacom adds 2.3 million households
to</strong></del></span> <span class="inserted"><ins><em>off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>600
+millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>company already monitors. Tivo
+customers are unaware they're being watched by advertisers. By
+combining TV viewing information with online social media
+participation, Tivo can now <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+correlate TV advertisement with online purchases</a>, exposing all
+users to new combined surveillance by default.</p>
+</li>
+
+<li>
+<p>Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
@@ -1488,7 +1487,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2016-2020</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2016-2021</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1499,7 +1498,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/30 10:33:45 $
+$Date: 2021/01/06 10:32:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/malware-appliances.de.po 30 Dec 2020 10:33:45 -0000 1.98
+++ po/malware-appliances.de.po 6 Jan 2021 10:32:24 -0000 1.99
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2351,10 +2363,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2016-] {+2016-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2016-] {+2016-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: po/malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/malware-appliances.es.po 31 Dec 2020 10:25:11 -0000 1.40
+++ po/malware-appliances.es.po 6 Jan 2021 10:32:24 -0000 1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-12-31 11:18+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -94,6 +95,49 @@
"confiables que justifiquen su inclusión."
#. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# |
href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy
+# | Not Included”</a> list <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+“Minimum+} Security [-Standards\".-] {+Standards.”+}
+# | Insecure design of the program running on some of these devices <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded\">“Privacy Not Included”</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/"
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
+msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+"La mayorÃa de los aparatos conectados a Internet que se encuentran en la "
+"lista de Mozilla <a href=\"https://foundation.mozilla.org/es/"
+"privacynotincluded\">«Privacidad no incluida»</a><a href=\"https://"
+"foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">están "
+"diseñados para espiar a los usuarios</a>, incluso cuando cumplen los "
+"«Estándares mÃnimos de seguridad» de Mozilla. El diseño inseguro del "
+"programa que se ejecuta en algunos de estos aparatos <a href=\"https://"
+"foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster"
+"\">hace al usuario susceptible de ser espiado y también de ser presa de "
+"delincuentes informáticos</a>."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
@@ -1895,7 +1939,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+# | Copyright © 2016-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- po/malware-appliances.fr.po 30 Dec 2020 23:17:20 -0000 1.168
+++ po/malware-appliances.fr.po 6 Jan 2021 10:32:24 -0000 1.169
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-12-30 12:46+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -91,6 +92,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -1901,8 +1914,8 @@
"infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- po/malware-appliances.pot 30 Dec 2020 10:33:45 -0000 1.83
+++ po/malware-appliances.pot 6 Jan 2021 10:32:26 -0000 1.84
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,19 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a "
+"href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy "
+"Not Included”</a> list <a "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are
"
+"designed to snoop on users</a> even if they meet Mozilla's “Minimum "
+"Security Standards.” Insecure design of the program running on some of "
+"these devices <a "
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes
"
+"the user susceptible to be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a "
@@ -1265,7 +1278,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/malware-appliances.ru.po 30 Dec 2020 11:32:11 -0000 1.204
+++ po/malware-appliances.ru.po 6 Jan 2021 10:32:26 -0000 1.205
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -93,6 +94,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -1882,8 +1895,8 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.es-en.html 5 Jan 2021 11:02:25 -0000 1.15
+++ po/malware-games.es-en.html 6 Jan 2021 10:32:26 -0000 1.16
@@ -92,7 +92,7 @@
</li>
<li id="M202010210">
- <p>Minecraft players are <a
+ <p>As of 2019-2020, Minecraft players are <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
forced to move to Microsoft servers</a>, which results in
privacy violation. Microsoft publishes a program so users can run
@@ -420,7 +420,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/05 11:02:25 $
+$Date: 2021/01/06 10:32:26 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-games.es.po 6 Jan 2021 10:19:10 -0000 1.44
+++ po/malware-games.es.po 6 Jan 2021 10:32:26 -0000 1.45
@@ -531,10 +531,9 @@
"question_why_is_runescape_so_addicting/\">caracterÃsticas adictivas</a> "
"derivadas de <a href=\"/proprietary/proprietary-addictions.html#addictiveness"
"\">técnicas de manipulación de conducta</a>. Algunos aspectos repetitivos "
-"del juego, como el <cite><a href=\"https://es.wikipedia.org/wiki/"
-"Grind_(videojuegos)\">grinding</a></cite>, se pueden minimizar mediante "
-"pago, induciendo asà a niños y personas influenciables a gastar dinero en
el "
-"juego."
+"del juego, como el <cite><a href=\"https://es.wikipedia.org/wiki/Grind_"
+"(videojuegos)\">grinding</a></cite>, se pueden minimizar mediante pago, "
+"induciendo asà a niños y personas influenciables a gastar dinero en el
juego."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-microsoft.es-en.html 5 Jan 2021 11:02:25 -0000 1.82
+++ po/malware-microsoft.es-en.html 6 Jan 2021 10:32:26 -0000 1.83
@@ -449,7 +449,7 @@
</li>
<li id="M202010210">
- <p>Minecraft players are <a
+ <p>As of 2019-2020, Minecraft players are <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
forced to move to Microsoft servers</a>, which results in
privacy violation. Microsoft publishes a program so users can run
@@ -769,7 +769,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/05 11:02:25 $
+$Date: 2021/01/06 10:32:26 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/malware-microsoft.es.po 6 Jan 2021 10:19:10 -0000 1.204
+++ po/malware-microsoft.es.po 6 Jan 2021 10:32:26 -0000 1.205
@@ -939,17 +939,17 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
"telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder, "
"entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/"
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- po/nl.po 6 Jan 2021 03:01:41 -0000 1.260
+++ po/nl.po 6 Jan 2021 10:32:26 -0000 1.261
@@ -2170,6 +2170,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -3252,11 +3264,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2015, 2016-] {+2016-2020+} Free Software Foundation,
+# | Copyright © [-2015, 2016-] {+2016-2021+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3973,14 +3985,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2015, 2016-] {+2016-2021+} Free Software Foundation,
-# | Inc.
-#, fuzzy
-#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Apple's Operating Systems are-]{+Google's Software Is+} Malware - GNU
# | Project - Free Software Foundation
@@ -8628,18 +8632,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -8825,6 +8817,14 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2015, 2016-] {+2016-2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/pl.po 6 Jan 2021 03:01:44 -0000 1.259
+++ po/pl.po 6 Jan 2021 10:32:26 -0000 1.260
@@ -1742,6 +1742,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2824,11 +2836,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2016-2020+} Free Software
+# | Copyright © [-2013, 2014, 2015-] {+2016-2021+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3534,14 +3546,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2016-2021+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
# | Software Foundation
@@ -8131,18 +8135,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -8330,6 +8322,14 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2016-2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- po/pot 6 Jan 2021 03:01:45 -0000 1.258
+++ po/pot 6 Jan 2021 10:32:26 -0000 1.259
@@ -1539,6 +1539,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2612,7 +2624,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
@@ -3304,10 +3316,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -7429,18 +7437,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -7609,6 +7605,10 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- po/proprietary-surveillance.de-diff.html 6 Jan 2021 03:01:45 -0000
1.153
+++ po/proprietary-surveillance.de-diff.html 6 Jan 2021 10:32:27 -0000
1.154
@@ -2156,12 +2156,12 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed</em></ins></span> to <span class="removed"><del><strong>restrict
the use</strong></del></span> <span class="inserted"><ins><em>snoop on
users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the program running</em></ins></span> on <span
class="inserted"><ins><em>some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
the <span class="removed"><del><strong>user's computer, but it does
surveillance
too:</strong></del></span> <span class="inserted"><ins><em>user
susceptible to be snooped and exploited by crackers as
well</a>.</p>
@@ -3906,7 +3906,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:45 $
+$Date: 2021/01/06 10:32:27 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.366
retrieving revision 1.367
diff -u -b -r1.366 -r1.367
--- po/proprietary-surveillance.de.po 6 Jan 2021 03:01:45 -0000 1.366
+++ po/proprietary-surveillance.de.po 6 Jan 2021 10:32:27 -0000 1.367
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -3839,10 +3839,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- po/proprietary-surveillance.es.po 6 Jan 2021 10:19:11 -0000 1.129
+++ po/proprietary-surveillance.es.po 6 Jan 2021 10:32:27 -0000 1.130
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2021-01-06 11:12+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -441,17 +442,17 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
"telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder, "
"entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/"
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -2452,8 +2453,8 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
@@ -3337,13 +3338,34 @@
"\">#SpywareInEquipment</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# |
href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy
+# | Not Included”</a> list <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+“Minimum+} Security [-Standards\".-] {+Standards.”+}
+# | Insecure design of the program running on some of these devices <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded\">“Privacy Not Included”</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/"
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.583
retrieving revision 1.584
diff -u -b -r1.583 -r1.584
--- po/proprietary-surveillance.fr.po 6 Jan 2021 03:01:45 -0000 1.583
+++ po/proprietary-surveillance.fr.po 6 Jan 2021 10:32:27 -0000 1.584
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2021-01-04 17:56+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -3340,10 +3340,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary-surveillance.it-diff.html 6 Jan 2021 03:01:46 -0000
1.219
+++ po/proprietary-surveillance.it-diff.html 6 Jan 2021 10:32:27 -0000
1.220
@@ -2332,11 +2332,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -3733,7 +3733,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:46 $
+$Date: 2021/01/06 10:32:27 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- po/proprietary-surveillance.it.po 6 Jan 2021 03:01:46 -0000 1.378
+++ po/proprietary-surveillance.it.po 6 Jan 2021 10:32:27 -0000 1.379
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -3606,10 +3606,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- po/proprietary-surveillance.ja-diff.html 6 Jan 2021 03:01:46 -0000
1.237
+++ po/proprietary-surveillance.ja-diff.html 6 Jan 2021 10:32:27 -0000
1.238
@@ -2365,11 +2365,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -3609,7 +3609,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:46 $
+$Date: 2021/01/06 10:32:27 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.360
retrieving revision 1.361
diff -u -b -r1.360 -r1.361
--- po/proprietary-surveillance.ja.po 6 Jan 2021 03:01:48 -0000 1.360
+++ po/proprietary-surveillance.ja.po 6 Jan 2021 10:32:27 -0000 1.361
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -2802,10 +2802,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary-surveillance.pot 6 Jan 2021 03:01:49 -0000 1.299
+++ po/proprietary-surveillance.pot 6 Jan 2021 10:32:27 -0000 1.300
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2259,11 +2259,11 @@
"Most Internet connected devices in Mozilla's <a "
"href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy "
"Not Included”</a> list <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are
"
-"designed to snoop on users</a> even if they meet Mozilla's \"Minimum "
-"Security Standards\". Insecure design of the program running on some of "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are
"
+"designed to snoop on users</a> even if they meet Mozilla's “Minimum "
+"Security Standards.” Insecure design of the program running on some of "
"these devices <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes
"
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes
"
"the user susceptible to be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.667
retrieving revision 1.668
diff -u -b -r1.667 -r1.668
--- po/proprietary-surveillance.ru.po 6 Jan 2021 03:01:49 -0000 1.667
+++ po/proprietary-surveillance.ru.po 6 Jan 2021 10:32:27 -0000 1.668
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -3311,10 +3311,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/proprietary.de-diff.html 6 Jan 2021 03:01:49 -0000 1.213
+++ po/proprietary.de-diff.html 6 Jan 2021 10:32:28 -0000 1.214
@@ -216,11 +216,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -334,7 +334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:49 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- po/proprietary.de.po 6 Jan 2021 03:01:50 -0000 1.251
+++ po/proprietary.de.po 6 Jan 2021 10:32:28 -0000 1.252
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -467,10 +467,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- po/proprietary.es.po 6 Jan 2021 10:19:10 -0000 1.378
+++ po/proprietary.es.po 6 Jan 2021 10:32:28 -0000 1.379
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-06 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -318,13 +319,34 @@
msgstr "Añadidos recientes"
#. type: Content of: <div><ul><li><p>
+# | Most Internet connected devices in Mozilla's <a
+# |
href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy
+# | Not Included”</a> list <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are+}
+# | designed to snoop on users</a> even if they meet Mozilla's [-\"Minimum-]
+# | {+“Minimum+} Security [-Standards\".-] {+Standards.”+}
+# | Insecure design of the program running on some of these devices <a
+# |
[-href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes-]
+# |
{+href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes+}
+# | the user susceptible to be snooped and exploited by crackers as well</a>.
+#, fuzzy
+#| msgid ""
+#| "Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded\">“Privacy Not Included”</"
+#| "a> list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/"
+#| "arlo-video-doorbell\">are designed to snoop on users</a> even if they "
+#| "meet Mozilla's \"Minimum Security Standards\". Insecure design of the "
+#| "program running on some of these devices <a href=\"https://foundation."
+#| "mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes the "
+#| "user susceptible to be snooped and exploited by crackers as well</a>."
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.423
retrieving revision 1.424
diff -u -b -r1.423 -r1.424
--- po/proprietary.fr.po 6 Jan 2021 03:01:50 -0000 1.423
+++ po/proprietary.fr.po 6 Jan 2021 10:32:28 -0000 1.424
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2021-01-05 16:49+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -326,10 +326,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/proprietary.it-diff.html 6 Jan 2021 03:01:50 -0000 1.225
+++ po/proprietary.it-diff.html 6 Jan 2021 10:32:28 -0000 1.226
@@ -215,11 +215,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -333,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:50 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- po/proprietary.it.po 6 Jan 2021 03:01:50 -0000 1.260
+++ po/proprietary.it.po 6 Jan 2021 10:32:28 -0000 1.261
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -472,10 +472,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- po/proprietary.ja-diff.html 6 Jan 2021 03:01:51 -0000 1.230
+++ po/proprietary.ja-diff.html 6 Jan 2021 10:32:28 -0000 1.231
@@ -214,11 +214,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -332,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:51 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- po/proprietary.ja.po 6 Jan 2021 03:01:51 -0000 1.244
+++ po/proprietary.ja.po 6 Jan 2021 10:32:28 -0000 1.245
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -330,10 +330,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/proprietary.nl-diff.html 6 Jan 2021 03:01:51 -0000 1.226
+++ po/proprietary.nl-diff.html 6 Jan 2021 10:32:28 -0000 1.227
@@ -215,11 +215,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -333,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:51 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/proprietary.nl.po 6 Jan 2021 03:01:52 -0000 1.234
+++ po/proprietary.nl.po 6 Jan 2021 10:32:28 -0000 1.235
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -375,10 +375,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- po/proprietary.pl-diff.html 6 Jan 2021 03:01:52 -0000 1.243
+++ po/proprietary.pl-diff.html 6 Jan 2021 10:32:28 -0000 1.244
@@ -214,11 +214,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -332,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:52 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- po/proprietary.pl.po 6 Jan 2021 03:01:52 -0000 1.227
+++ po/proprietary.pl.po 6 Jan 2021 10:32:28 -0000 1.228
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -556,10 +556,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/proprietary.pot 6 Jan 2021 03:01:57 -0000 1.224
+++ po/proprietary.pot 6 Jan 2021 10:32:28 -0000 1.225
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -266,11 +266,11 @@
"Most Internet connected devices in Mozilla's <a "
"href=\"https://foundation.mozilla.org/en/privacynotincluded\">“Privacy "
"Not Included”</a> list <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell\">are
"
-"designed to snoop on users</a> even if they meet Mozilla's \"Minimum "
-"Security Standards\". Insecure design of the program running on some of "
+"href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell\">are
"
+"designed to snoop on users</a> even if they meet Mozilla's “Minimum "
+"Security Standards.” Insecure design of the program running on some of "
"these devices <a "
-"href=\"https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster\">makes
"
+"href=\"https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster\">makes
"
"the user susceptible to be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- po/proprietary.pt-br.po 6 Jan 2021 03:01:57 -0000 1.374
+++ po/proprietary.pt-br.po 6 Jan 2021 10:32:28 -0000 1.375
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2021-01-05 16:36-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -320,10 +320,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.449
retrieving revision 1.450
diff -u -b -r1.449 -r1.450
--- po/proprietary.ru.po 6 Jan 2021 03:01:57 -0000 1.449
+++ po/proprietary.ru.po 6 Jan 2021 10:32:28 -0000 1.450
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -329,10 +329,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.tr.po 6 Jan 2021 03:01:57 -0000 1.102
+++ po/proprietary.tr.po 6 Jan 2021 10:32:28 -0000 1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-12-17 18:19+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -321,10 +321,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- po/proprietary.zh-cn.po 6 Jan 2021 03:01:58 -0000 1.129
+++ po/proprietary.zh-cn.po 6 Jan 2021 10:32:28 -0000 1.130
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2021-01-05 12:30+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -302,10 +302,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- po/proprietary.zh-tw-diff.html 6 Jan 2021 03:01:58 -0000 1.206
+++ po/proprietary.zh-tw-diff.html 6 Jan 2021 10:32:28 -0000 1.207
@@ -216,11 +216,11 @@
<p>Most Internet connected devices in Mozilla's <a
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
- Mozilla's "Minimum Security Standards". Insecure
+ Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
@@ -334,7 +334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/06 03:01:58 $
+$Date: 2021/01/06 10:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- po/proprietary.zh-tw.po 6 Jan 2021 03:01:58 -0000 1.214
+++ po/proprietary.zh-tw.po 6 Jan 2021 10:32:28 -0000 1.215
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-06 02:55+0000\n"
+"POT-Creation-Date: 2021-01-06 10:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -445,10 +445,10 @@
msgid ""
"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
"be snooped and exploited by crackers as well</a>."
msgstr ""
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- po/pt-br.po 6 Jan 2021 03:01:58 -0000 1.329
+++ po/pt-br.po 6 Jan 2021 10:32:28 -0000 1.330
@@ -1911,6 +1911,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -3217,7 +3229,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2016-2019 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -4113,12 +4125,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2016-2019 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9257,18 +9263,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -9473,6 +9467,12 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2016-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.552
retrieving revision 1.553
diff -u -b -r1.552 -r1.553
--- po/ru.po 6 Jan 2021 03:01:59 -0000 1.552
+++ po/ru.po 6 Jan 2021 10:32:29 -0000 1.553
@@ -2240,6 +2240,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -3880,8 +3892,8 @@
"ÑиÑанами</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4946,10 +4958,6 @@
"компÑÑÑеÑе игÑока, и вÑÐ´Ð°ÐµÑ Ð¸Ð·ÑÑдное
колиÑеÑÑво лиÑнÑÑ
даннÑÑ
</a>, вклÑÑÐ°Ñ "
"маÑÑÑ Ð´ÐµÐ¹ÑÑвий, никак не ÑвÑзаннÑÑ
Ñ
обманом."
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2021 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -11117,18 +11125,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -11368,6 +11364,10 @@
"Ðиже пÑиводÑÑÑÑ Ð¿ÑимеÑÑ Ð¿Ð¾Ð´Ð¿Ð¸Ñки на
пÑогÑаммÑ, коÑоÑÑе нанеÑли полÑзоваÑелÑм "
"непоÑÑедÑÑвеннÑй вÑед."
+#. type: Content of: <div><p>
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- po/tr.po 6 Jan 2021 03:01:59 -0000 1.112
+++ po/tr.po 6 Jan 2021 10:32:29 -0000 1.113
@@ -1682,6 +1682,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2812,7 +2824,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3608,12 +3620,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8194,18 +8200,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -8405,6 +8399,12 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- po/zh-cn.po 6 Jan 2021 03:02:00 -0000 1.113
+++ po/zh-cn.po 6 Jan 2021 10:32:29 -0000 1.114
@@ -1678,6 +1678,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2809,7 +2821,7 @@
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
#| "Software Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
"Software Foundation, Inc."
@@ -3565,16 +3577,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-#| "Software Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-"Software Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8009,18 +8011,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -8217,6 +8207,16 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/zh-tw.po 6 Jan 2021 03:02:01 -0000 1.259
+++ po/zh-tw.po 6 Jan 2021 10:32:29 -0000 1.260
@@ -1739,6 +1739,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
+"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
+"list <a href=\"https://foundation.mozilla.org/privacynotincluded/arlo-video-"
+"doorbell\">are designed to snoop on users</a> even if they meet Mozilla's "
+"“Minimum Security Standards.” Insecure design of the program "
+"running on some of these devices <a href=\"https://foundation.mozilla.org/"
+"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
+"be snooped and exploited by crackers as well</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Some Wavelink and JetStream wifi routers have universal back doors that "
"enable unauthenticated users to remotely control not only the routers, but "
"also any devices connected to the network. There is evidence that <a href="
@@ -2817,13 +2829,13 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2020+} Free
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2021+} Free
# | Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -3533,18 +3545,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2021+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid "Copyright © 2016-2021 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
# | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
# | Software Foundation
@@ -8031,18 +8031,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Most Internet connected devices in Mozilla's <a href=\"https://foundation."
-"mozilla.org/en/privacynotincluded\">“Privacy Not Included”</a> "
-"list <a href=\"https://foundation.mozilla.org/en/privacynotincluded/arlo-"
-"video-doorbell\">are designed to snoop on users</a> even if they meet "
-"Mozilla's \"Minimum Security Standards\". Insecure design of the program "
-"running on some of these devices <a href=\"https://foundation.mozilla.org/en/"
-"privacynotincluded/vibratissimo-panty-buster\">makes the user susceptible to "
-"be snooped and exploited by crackers as well</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
@@ -8232,6 +8220,18 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2016-2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2016-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-games.es.html malware-m...,
GNUN <=