[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 12 Jan 2021 04:03:18 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/01/12 04:03:17
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.es.po malware-cars.fr.po
malware-cars.pot malware-cars.ru.po
malware-games.de-diff.html malware-games.de.po
malware-games.es.po malware-games.fr.po
malware-games.ja-diff.html malware-games.ja.po
malware-games.pot malware-games.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-addictions.es.po
proprietary-addictions.fr.po
proprietary-addictions.pot
proprietary-addictions.ru.po
proprietary-addictions.tr.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.587&r2=1.588
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.671&r2=1.672
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.429&r2=1.430
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.455&r2=1.456
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.565&r2=1.566
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.266&r2=1.267
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- de.po 11 Jan 2021 09:34:34 -0000 1.266
+++ de.po 12 Jan 2021 09:03:10 -0000 1.267
@@ -5235,7 +5235,7 @@
# | car's location at any time. (See [-<a
# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
+# |
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
# | privacy statement</a>.)+} The company says it doesn't store this
# | information, but if the state orders it to get the data and hand it over,
# | the state can store it.
@@ -5250,7 +5250,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -5337,10 +5337,10 @@
"\">Automotive Security And Privacy Center</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2017-] {+2017-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2017 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5628,12 +5628,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -6696,6 +6697,13 @@
"âcrackenâ</i>). Glücklicherweise sind die meisten Android-Geräte keine "
"Tyrannen."
+#. type: Content of: <div><p>
+# | Copyright © [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Malware in [-Appliances-] {+Online Conferencing+} - GNU Project - Free
# | Software Foundation
@@ -10664,7 +10672,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -10741,9 +10749,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
@@ -14540,6 +14555,32 @@
#, fuzzy
#~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time. (See <a href=\"http://www.teslamotors.com/"
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Fahrzeuge des amerikanischen Herstellers Tesla ermöglichen dem "
+#~ "Unternehmen Datenmaterial mittels Fernzugriff abzugreifen und jederzeit "
+#~ "die Position des Fahrzeugs zu bestimmen (siehe <a href=\"//www."
+#~ "teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\" type=\"application/pdf"
+#~ "\" hreflang=\"en\">Datenschutzerklärung, Abschnitt 2 Abs. b und c</a>). "
+#~ "Das Unternehmen gibt an, dass es diese Informationen nicht speichert, "
+#~ "aber wenn staatliche Stellen deren Aushändigung anordnen und die Daten "
+#~ "übergeben werden, könnte der Staat sie speichern."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- es.po 11 Jan 2021 09:34:34 -0000 1.378
+++ es.po 12 Jan 2021 09:03:12 -0000 1.379
@@ -4938,10 +4938,25 @@
"la locura</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -4952,7 +4967,7 @@
"sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
"\">declaración de privacidad</a>). La compañÃa afirma que no guarda esa "
"información, pero si el Estado le ordena obtener los datos y entregarlos, el
"
-"Estado los puede guardar. "
+"Estado los puede guardar."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -5000,7 +5015,10 @@
"Center</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5450,13 +5468,32 @@
"puedan ejecutarse en otros sistemas</a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Muchos populares juegos para móviles están basados en el sistema "
"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
@@ -6670,6 +6707,10 @@
"restricción). Afortunadamente, la mayorÃa de los dispositivos Android no
son "
"tiranos."
+#. type: Content of: <div><p>
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Malware in [-Mobile Devices-] {+Online Conferencing+} - GNU Project - Free
# | Software Foundation
@@ -10754,9 +10795,21 @@
msgstr "Juegos"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -10881,26 +10934,11 @@
"adictos a un juego."
#. type: Content of: <div><div><ul><li>
-# | “Loot boxes” are a direct application of the random reward
-# | mechanism, and their addictiveness is enhanced by seductive animation.
-# | They are <a
-# |
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">
-# | akin to [-gambling</a>.-] {+gambling</a>, and so are the <a
-# | href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very
-# | popular in Asia, which may be considered the ancestors of loot boxes.+}
-#, fuzzy
-#| msgid ""
-#| "“Loot boxes” are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgid ""
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"Las «cajas de botÃn» (<cite>loot boxes</cite>) son una aplicación directa
"
"del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
@@ -10909,6 +10947,15 @@
"juegos de apuestas</a>."
#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
# | The {+developers of gratis mobile games apply the techniques described
# | above to <a
# | href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\">
@@ -14780,10 +14827,65 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Los automóviles Tesla permiten que la compañÃa extraiga datos de manera
"
+#~ "remota para determinar la ubicación del vehÃculo en cualquier momento "
+#~ "(véase la Sección 2, párrafos b y c de la <a href=\"http://www."
+#~ "teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\">declaración de "
+#~ "privacidad</a>). La compañÃa afirma que no guarda esa información, pero
"
+#~ "si el Estado le ordena obtener los datos y entregarlos, el Estado los "
+#~ "puede guardar. "
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The “complete "
+#~ "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Muchos populares juegos para móviles están basados en el sistema "
+#~ "<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
+#~ "tragamonedas desde 2010. El «<cite>gacha</cite> completo» se declaró "
+#~ "ilegal en Japón en 2012, pero <a href=\"https://www.forbes.com/sites/"
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\">las variantes legales siguen explotando a los "
+#~ "usuarios</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y renueven su suscripción. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#, fuzzy
+#~| msgid ""
+#~| "“Loot boxes” are a direct application of the random reward "
+#~| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
+#~| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ msgid ""
#~ "“Loot boxes” are a direct application of the random reward "
#~ "mechanism, and their addictiveness is enhanced by seductive animation. "
#~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
#~ msgstr ""
#~ "Las «cajas de botÃn» (<cite>loot boxes</cite>) son una aplicación
directa "
#~ "del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- fr.po 11 Jan 2021 12:25:24 -0000 1.470
+++ fr.po 12 Jan 2021 09:03:12 -0000 1.471
@@ -4360,10 +4360,25 @@
"démence</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -4424,7 +4439,10 @@
"Privacy Center</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -4774,13 +4792,32 @@
"systèmes</a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Beaucoup de jeux populaires sur mobiles sont basés sur le système
<i>gacha</"
"i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
@@ -5770,6 +5807,10 @@
"\">des téléphones Android qui sont des tyrans</a> (bien que quelqu'un ait "
"trouvé moyen de briser ces restrictions)."
+#. type: Content of: <div><p>
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
msgstr ""
@@ -9324,9 +9365,21 @@
msgstr "Jeux"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -9424,13 +9477,28 @@
msgstr "Il y a des moyens encore plus élaborés de rendre les jeux addictifs."
#. type: Content of: <div><div><ul><li>
+# | “Loot boxes” are a direct application of the random reward
+# | mechanism, and their addictiveness is enhanced by seductive animation.
+# | They are <a
+# |
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">
+# | akin to [-gambling</a>, and so are the <a
+# | href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very
+# | popular in Asia, which may be considered the ancestors of loot boxes.-]
+# | {+gambling</a>.+}
+#, fuzzy
+#| msgid ""
+#| "“Loot boxes” are a direct application of the random reward "
+#| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
+#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#| "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#| "a>, very popular in Asia, which may be considered the ancestors of loot "
+#| "boxes."
msgid ""
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"Les « boîtes à butin » sont une application directe du mécanisme de "
"récompense aléatoire. De plus leur pouvoir addictif est amplifié par des "
@@ -9442,6 +9510,15 @@
#. type: Content of: <div><div><ul><li>
msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
"The developers of gratis mobile games apply the techniques described above "
"to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/"
"\"> turn their products into slot machines</a>. This is clearly described in "
@@ -12716,3 +12793,66 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Les véhicules Tesla permettent à cette société d'extraire des données
à "
+#~ "distance et de localiser la voiture à chaque instant (voir la section 2,
"
+#~ "paragraphes b et c de la <a href=\"http://www.teslamotors.com/sites/"
+#~ "default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~ "\">déclaration de confidentialité</a>). La société dit qu'elle ne "
+#~ "conserve pas cette information, mais déclare que si l'Ãtat lui donne "
+#~ "l'ordre de récupérer ces données et de les lui transmettre, l'Ãtat
peut "
+#~ "les conserver."
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The “complete "
+#~ "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Beaucoup de jeux populaires sur mobiles sont basés sur le système "
+#~ "<i>gacha</i>, qui transforme les téléphones en machines à sous depuis "
+#~ "2010. Le « <i>gacha</i> complet » est illégal au Japon depuis 2012,
mais "
+#~ "<a href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-"
+#~ "mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">les "
+#~ "variantes légales continuent à exploiter les utilisateurs</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs â et continuent à payer leur abonnement. Pour
obtenir "
+#~ "ce résultat, les développeurs appliquent des <a
href=\"http://www.cracked."
+#~ "com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\">techniques issues de recherches comportementales et sur "
+#~ "le cerveau</a>Â :"
+
+#~ msgid ""
+#~ "“Loot boxes” are a direct application of the random reward "
+#~ "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
+#~ msgstr ""
+#~ "Les « boîtes à butin » sont une application directe du mécanisme de
"
+#~ "récompense aléatoire. De plus leur pouvoir addictif est amplifié par
des "
+#~ "animations séduisantes. Elles sont <a href=\"https://www.pcgamer.com/"
+#~ "behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">très "
+#~ "semblables à des jeux en ligne</a>, de même que les <a href=\"https://"
+#~ "wikipedia.org/wiki/Gacha_game\">jeux <i>gacha</i></a>, très populaires en
"
+#~ "Asie, qui peuvent être considérés comme les ancêtres des boîtes Ã
butin."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- it.po 11 Jan 2021 09:34:34 -0000 1.266
+++ it.po 12 Jan 2021 09:03:12 -0000 1.267
@@ -4856,7 +4856,7 @@
# | car's location at any time. (See [-<a
# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
+# |
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
# | privacy statement</a>.)+} The company says it doesn't store this
# | information, but if the state orders it to get the data and hand it over,
# | the state can store it.
@@ -4871,7 +4871,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -4957,10 +4957,10 @@
"faq.html\">Ulteriori informazioni</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2017-] {+2017-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5234,12 +5234,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -6261,6 +6262,13 @@
"qualcuno ha trovato un modo per aggirare la limitazione). Fortunatamente, la "
"maggior parte dei dispositivi Android non sono tiranni."
+#. type: Content of: <div><p>
+# | Copyright © [-2014-2017-] {+2017-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Malware in [-Mobile Devices-] {+Online Conferencing+} - GNU Project - Free
# | Software Foundation
@@ -9904,7 +9912,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -9981,9 +9989,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
@@ -13625,6 +13640,30 @@
#, fuzzy
#~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time. (See <a href=\"http://www.teslamotors.com/"
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Le automobili Tesla permettono alla società di estrarre dati a distanza e
"
+#~ "di determinare la posizione del veicolo in qualsiasi momento. (Vedere <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\">Sezione 2, paragrafi b "
+#~ "e c</a>.). La società sostiene di non raccogliere queste informazioni, ma
"
+#~ "se il governo dovesse ordinare di farlo e di consegnare le informazioni, "
+#~ "questo potrebbe raccoglierle."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- ja.po 11 Jan 2021 09:34:35 -0000 1.274
+++ ja.po 12 Jan 2021 09:03:12 -0000 1.275
@@ -3759,7 +3759,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3821,9 +3821,9 @@
#. type: Content of: <div><p>
#, fuzzy
-#| msgid "Copyright © 2017 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2017 Free Software Foundation, Inc."
+#| msgid "Copyright © 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -4077,12 +4077,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4885,6 +4886,12 @@
"å¶éãç ´å£ããæ¹æ³ãã¿ã¤ãã
ãã¾ããã)ã幸ããªãã¨ã«ãå¤ãã®ã¢ã³ããã¤ãã®ã"
"ãã¤ã¹ã¯æ´åã§ã¯ããã¾ããã"
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2017 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -7727,7 +7734,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -7804,9 +7811,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
@@ -10798,6 +10812,28 @@
#, fuzzy
#~| msgid ""
+#~| "Tesla cars allow the company to extract data remotely and determine the "
+#~| "car's location at any time. (See <a href=\"http://www.teslamotors.com/"
+#~| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
+#~| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
+#~| "store this information, but if the state orders it to get the data and "
+#~| "hand it over, the state can store it."
+#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "Tesla社ã®è»ã¯Tesla社ãé
éã§ãã¼ã¿ãæ½åºããè»ã®ä½ç½®ã常æç¥ããã¨ãã§ãã¾"
+#~ "ãã(<a href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\">
ã»ã¯ã·ã§ã³2ããã©ã°ã©ã"
+#~ "bã¨c</a>ãã覧ãã ãã)ãTesla社ã¯ãã®æ
å
±ãä¿ç®¡ããªãã¨è¨ãã¾ãããå½ãã"
+#~
"ã®ãã¼ã¿ãåå¾ãã¦å¼ã渡ãããã«å½ä»¤ããã°ãå½ã¯ä¿ç®¡ã§ãã¾ãã"
+
+#, fuzzy
+#~| msgid ""
#~| "As of January, 2017, the files in this directory list around 260 "
#~| "instances of malicious functionalities, but there are surely thousands "
#~| "more we don't know about."
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-cars.de-diff.html 17 Oct 2020 08:05:07 -0000 1.39
+++ malware-cars.de-diff.html 12 Jan 2021 09:03:12 -0000 1.40
@@ -271,9 +271,9 @@
</li>
<li id="M201608110">
- <p>Due to weak security, <a
+ <p>Due</em></ins></span> to <span
class="removed"><del><strong>conceal.</p></strong></del></span> <span
class="inserted"><ins><em>weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
- is easy</em></ins></span> to <span
class="removed"><del><strong>conceal.</p></strong></del></span> <span
class="inserted"><ins><em>open the doors of 100 million cars built by
+ is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p></em></ins></span>
</li>
@@ -369,7 +369,7 @@
at any time. (See Section 2, paragraphs b and c of the</em></ins></span>
<a
<span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ <span
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
information, but if the state orders it to get the data and hand it
over, the state can store it.</p></em></ins></span>
@@ -462,7 +462,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017-2020</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017-2021</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -473,7 +473,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2021/01/12 09:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-cars.de.po 17 Oct 2020 08:05:07 -0000 1.29
+++ malware-cars.de.po 12 Jan 2021 09:03:12 -0000 1.30
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -597,7 +597,7 @@
# | car's location at any time. (See [-<a
# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
+# |
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
# | privacy statement</a>.)+} The company says it doesn't store this
# | information, but if the state orders it to get the data and hand it over,
# | the state can store it.
@@ -612,7 +612,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -752,10 +752,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2017-] {+2017-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2017-] {+2017-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2017 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-cars.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-cars.es.po 17 Oct 2020 11:29:04 -0000 1.14
+++ malware-cars.es.po 12 Jan 2021 09:03:12 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-10-17 13:15+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -514,10 +515,25 @@
"la locura</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -621,7 +637,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-cars.fr.po 30 Nov 2020 13:23:44 -0000 1.49
+++ malware-cars.fr.po 12 Jan 2021 09:03:12 -0000 1.50
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -510,10 +511,25 @@
"démence</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -616,7 +632,10 @@
"infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-cars.pot 17 Oct 2020 08:05:07 -0000 1.23
+++ malware-cars.pot 12 Jan 2021 09:03:12 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -361,7 +361,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
"
"privacy statement</a>.) The company says it doesn't store this information, "
"but if the state orders it to get the data and hand it over, the state can "
"store it."
@@ -431,7 +431,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-cars.ru.po 19 Oct 2020 10:00:04 -0000 1.54
+++ malware-cars.ru.po 12 Jan 2021 09:03:12 -0000 1.55
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -505,10 +506,25 @@
"пÑиводиÑÑ Ð¿Ð¾ÑÑебиÑелей в беÑенÑÑво</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -609,7 +625,10 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-games.de-diff.html 8 Jan 2021 15:04:05 -0000 1.56
+++ malware-games.de-diff.html 12 Jan 2021 09:03:12 -0000 1.57
@@ -107,15 +107,15 @@
</li>
<li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
+ <p>The addictive Genshin Impact relentlessly</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
players to spend money by overwhelming the game play with loot
boxes</a>.</p>
</li>
<li id="M202010210">
- <p>As of 2019-2020, Minecraft players are</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
+ <p>As of 2019-2020, Minecraft players are <a
+
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
forced to move to Microsoft servers</a>, which results in
privacy violation. Microsoft publishes a program so users can run
their own server, but the program is proprietary</em></ins></span> and
@@ -193,34 +193,34 @@
<p>A nonfree video game, available through</em></ins></span> the
<span class="removed"><del><strong>developer's awareness</strong></del></span>
<span class="inserted"><ins><em>nonfree Steam client, <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
included a “miner”</a>, i.e. an
executable</em></ins></span> that <span
class="inserted"><ins><em>hijacks</em></ins></span>
- the <span class="removed"><del><strong>users would be
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users'
computers</em></ins></span> to <span class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> <span
class="inserted"><ins><em>mine a cryptocurrency.</p>
+ the <span class="removed"><del><strong>users would be
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users'
computers to mine a cryptocurrency.</p>
</li>
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
- shut down</em></ins></span> the <span
class="removed"><del><strong>developer</strong></del></span> <span
class="inserted"><ins><em>server, and all copies stopped
working</a>.</p>
+ shut down the server, and all copies stopped working</a>.</p>
</li>
<li id="M201806240">
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it</em></ins></span> to <span
class="removed"><del><strong>impose some.
-</p>
-</div>
-
-<p>Here</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> the <span
class="removed"><del><strong>developer</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>impose some.
+</p>
+</div>
+
+<p>Here</strong></del></span> <span class="inserted"><ins><em>snoop on
all open processes running on its user's computer</a>.</p>
</li>
<li id="M201712060">
@@ -229,8 +229,8 @@
gratis-to-play-and-not-win-much games manipulate their useds
psychologically</a>.</p>
- <p>These manipulative behaviors are malicious functionalities, and
they</em></ins></span>
- are <span class="removed"><del><strong>examples</strong></del></span>
<span class="inserted"><ins><em>possible because the game is proprietary. If it
were free, people
+ <p>These manipulative behaviors</em></ins></span> are <span
class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>malicious functionalities, and they
+ are possible because the game is proprietary. If it were free, people
could publish a non-manipulative version and play that instead.</p>
</li>
@@ -284,12 +284,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M201512290">
@@ -482,7 +483,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-games.de.po 8 Jan 2021 15:04:05 -0000 1.57
+++ malware-games.de.po 12 Jan 2021 09:03:12 -0000 1.58
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-games.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-12-05 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -421,12 +421,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-games.es.po 9 Jan 2021 10:59:51 -0000 1.48
+++ malware-games.es.po 12 Jan 2021 09:03:12 -0000 1.49
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-09 11:38+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -430,13 +431,32 @@
"ejecutarse en otros sistemas</a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Muchos populares juegos para móviles están basados en el sistema "
"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
Index: malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- malware-games.fr.po 8 Jan 2021 16:10:45 -0000 1.102
+++ malware-games.fr.po 12 Jan 2021 09:03:12 -0000 1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-08 17:08+0100\n"
"Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -428,13 +429,32 @@
"systèmes</a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Beaucoup de jeux populaires sur mobiles sont basés sur le système
<i>gacha</"
"i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
Index: malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-games.ja-diff.html 8 Jan 2021 15:04:05 -0000 1.65
+++ malware-games.ja-diff.html 12 Jan 2021 09:03:12 -0000 1.66
@@ -107,15 +107,15 @@
</li>
<li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
+ <p>The addictive Genshin Impact relentlessly</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
players to spend money by overwhelming the game play with loot
boxes</a>.</p>
</li>
<li id="M202010210">
- <p>As of 2019-2020, Minecraft players are</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
+ <p>As of 2019-2020, Minecraft players are <a
+
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
forced to move to Microsoft servers</a>, which results in
privacy violation. Microsoft publishes a program so users can run
their own server, but the program is proprietary</em></ins></span> and
@@ -193,34 +193,34 @@
<p>A nonfree video game, available through</em></ins></span> the
<span class="removed"><del><strong>developer's awareness</strong></del></span>
<span class="inserted"><ins><em>nonfree Steam client, <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
included a “miner”</a>, i.e. an
executable</em></ins></span> that <span
class="inserted"><ins><em>hijacks</em></ins></span>
- the <span class="removed"><del><strong>users would be
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users'
computers</em></ins></span> to <span class="removed"><del><strong>fix any
-malicious functionalities tempts</strong></del></span> <span
class="inserted"><ins><em>mine a cryptocurrency.</p>
+ the <span class="removed"><del><strong>users would be
powerless</strong></del></span> <span class="inserted"><ins><em>CPU in users'
computers to mine a cryptocurrency.</p>
</li>
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
- shut down</em></ins></span> the <span
class="removed"><del><strong>developer</strong></del></span> <span
class="inserted"><ins><em>server, and all copies stopped
working</a>.</p>
+ shut down the server, and all copies stopped working</a>.</p>
</li>
<li id="M201806240">
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it</em></ins></span> to <span
class="removed"><del><strong>impose some.
-</p>
-</div>
-
-<p>Here</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>fix any
+malicious functionalities tempts</strong></del></span> the <span
class="removed"><del><strong>developer</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>impose some.
+</p>
+</div>
+
+<p>Here</strong></del></span> <span class="inserted"><ins><em>snoop on
all open processes running on its user's computer</a>.</p>
</li>
<li id="M201712060">
@@ -229,8 +229,8 @@
gratis-to-play-and-not-win-much games manipulate their useds
psychologically</a>.</p>
- <p>These manipulative behaviors are malicious functionalities, and
they</em></ins></span>
- are <span class="removed"><del><strong>examples</strong></del></span>
<span class="inserted"><ins><em>possible because the game is proprietary. If it
were free, people
+ <p>These manipulative behaviors</em></ins></span> are <span
class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>malicious functionalities, and they
+ are possible because the game is proprietary. If it were free, people
could publish a non-manipulative version and play that instead.</p>
</li>
@@ -284,12 +284,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M201512290">
@@ -482,7 +483,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-games.ja.po 8 Jan 2021 15:04:05 -0000 1.57
+++ malware-games.ja.po 12 Jan 2021 09:03:12 -0000 1.58
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -354,12 +354,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-games.pot 8 Jan 2021 15:04:05 -0000 1.50
+++ malware-games.pot 12 Jan 2021 09:03:12 -0000 1.51
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -298,11 +298,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
"
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-games.ru.po 10 Jan 2021 08:31:39 -0000 1.108
+++ malware-games.ru.po 12 Jan 2021 09:03:12 -0000 1.109
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -429,13 +430,32 @@
"a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
"иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов в
игÑовÑе авÑомаÑÑ Ñ 2010 года. "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- malware-mobiles.de-diff.html 8 Jan 2021 15:04:05 -0000 1.90
+++ malware-mobiles.de-diff.html 12 Jan 2021 09:03:12 -0000 1.91
@@ -198,12 +198,14 @@
<ul class="blurbs">
<li id="M201604040">
- <p>Many popular</em></ins></span> mobile <span
class="removed"><del><strong>phones,</strong></del></span> <span
class="inserted"><ins><em>games are based on the
- gacha system,</em></ins></span> which <span
class="removed"><del><strong>permits</strong></del></span> <span
class="inserted"><ins><em>has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular</em></ins></span> mobile <span
class="removed"><del><strong>phones, which permits converting
+ them</strong></del></span> <span class="inserted"><ins><em>games include
a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
</ul>
@@ -213,8 +215,8 @@
<ul class="blurbs">
<li id="M209900001">
<p>See above for the <a
href="#universal-back-door-phone-modem">general universal back
- door</a> in essentially all mobile phones, which
permits</em></ins></span> converting
- them into full-time listening devices.</p>
+ door</a> in essentially all mobile phones, which permits converting
+ them</em></ins></span> into full-time listening devices.</p>
</li>
<span class="removed"><del><strong><li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
@@ -277,18 +279,18 @@
<h3 id="insecurity">Mobile Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike the rest
of</strong></del></span> <span class="inserted"><ins><em>make</em></ins></span>
the <span class="removed"><del><strong>file</strong></del></span> <span
class="inserted"><ins><em>computer download and execute any
code</em></ins></span>
- they <span class="removed"><del><strong>do not count as malware. We
mention them</strong></del></span> <span
class="inserted"><ins><em>wanted.</p>
+<p>These bugs are/were not intentional, so unlike</strong></del></span>
<span class="inserted"><ins><em>make</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>computer download and execute any code
+ they wanted.</p>
- <p>This is a concrete example of what users are
exposed</em></ins></span> to <span class="removed"><del><strong>refute the
+ <p>This is a concrete example</em></ins></span> of <span
class="removed"><del><strong>the file</strong></del></span> <span
class="inserted"><ins><em>what users are exposed to when</em></ins></span> they
<span class="removed"><del><strong>do not count as malware. We mention them to
refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
<ul>
<li>
- <p>Siri, Alexa, and all the other voice-control
systems</strong></del></span> <span class="inserted"><ins><em>when they
- run nonfree apps. They</em></ins></span> can <span
class="inserted"><ins><em>never</em></ins></span> be
+ <p>Siri, Alexa, and all the other voice-control
systems</strong></del></span>
+ <span class="inserted"><ins><em>run nonfree apps. They</em></ins></span>
can <span class="inserted"><ins><em>never</em></ins></span> be
<span class="removed"><del><strong><a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs</strong></del></span> <span class="inserted"><ins><em>completely
sure</em></ins></span> that <span class="removed"><del><strong>play
commands</strong></del></span> <span class="inserted"><ins><em>a nonfree
app is safe.</p>
</li>
@@ -320,18 +322,18 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
- all models</em></ins></span> of <span class="inserted"><ins><em>mobile
phones have</em></ins></span> a <span
class="removed"><del><strong>bug</strong></del></span> <span
class="inserted"><ins><em><a href="#universal-back-door-phone-modem">
- universal back door</em></ins></span> in
- <span class="removed"><del><strong>Broadcom's non-free
firmware.</p></strong></del></span> <span class="inserted"><ins><em>the
modem chip</a>. So why did Coolpad bother
- to introduce another? Because this one is controlled by
Coolpad.</p></em></ins></span>
- </li>
+ A Chinese version</em></ins></span> of <span
class="inserted"><ins><em>Android has</em></ins></span> a <span
class="removed"><del><strong>bug in
+ Broadcom's non-free firmware.</p>
+</li>
-<span class="removed"><del><strong><li>
-<p>Samsung
-phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
+<li>
+<p>Samsung</strong></del></span> <span
class="inserted"><ins><em>universal back door</a>. Nearly
+ all models of mobile</em></ins></span> phones <span
class="inserted"><ins><em>have a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
<span class="inserted"><ins><em>href="#universal-back-door-phone-modem">
+ universal back door in the modem chip</a>. So why did Coolpad bother
+ to introduce another? Because this one is controlled by Coolpad.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201403120.1">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come
with</em></ins></span>
@@ -396,58 +398,58 @@
<ul class="blurbs">
<li id="M201501030">
- <p id="netflix-app-geolocation-drm">The Netflix
Android</em></ins></span> app <span class="removed"><del><strong>listens all
the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ <p id="netflix-app-geolocation-drm">The Netflix
Android</em></ins></span> app <span class="removed"><del><strong>listens all
the time,</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
-</li>
+ be analyzing people's conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+ forces the use of Google DNS</a>. This is one of the methods that
+ Netflix uses</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>enforce the geolocation restrictions dictated by the
+ movie studios.</p></em></ins></span>
+ </li>
-<li>
- <p>A</strong></del></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+<span class="removed"><del><strong><li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated</strong></del></span>
- <span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces</em></ins></span> the <span class="removed"><del><strong>privacy
and security</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>283 Android VPN apps concluded that “in
spite</strong></del></span> <span class="inserted"><ins><em>Google
DNS</a>. This is one</em></ins></span> of the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given</strong></del></span> <span class="inserted"><ins><em>methods
that
- Netflix uses to enforce the geolocation restrictions
dictated</em></ins></span> by the
- <span class="removed"><del><strong>majority of VPN
apps—millions</strong></del></span>
- <span class="inserted"><ins><em>movie studios.</p>
- </li>
-</ul>
+<span class="inserted"><ins><em></ul>
<h3 id="insecurity">Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike the
rest</em></ins></span> of <span class="removed"><del><strong>users may be
unawarely subject</strong></del></span> <span class="inserted"><ins><em>the file
- they do not count as malware. We mention them</em></ins></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted</strong></del></span> <span class="inserted"><ins><em>refute the
+<p>These bugs are/were not intentional, so unlike</em></ins></span> the
<span class="removed"><del><strong>privacy and security</strong></del></span>
<span class="inserted"><ins><em>rest</em></ins></span> of <span
class="removed"><del><strong>283</strong></del></span> <span
class="inserted"><ins><em>the file
+ they do not count as malware. We mention them to refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
<ul class="blurbs">
<li id="M201908020">
- <p>Out of 21 gratis Android antivirus apps
- that were tested</em></ins></span> by
- <span class="removed"><del><strong>VPN apps.”</p>
-
- <p>Following is</strong></del></span> <span
class="inserted"><ins><em>security researchers, eight <a
+ <p>Out of 21 gratis</em></ins></span> Android <span
class="removed"><del><strong>VPN</strong></del></span> <span
class="inserted"><ins><em>antivirus</em></ins></span> apps <span
class="removed"><del><strong>concluded</strong></del></span>
+ that <span class="removed"><del><strong>“in
spite</strong></del></span> <span class="inserted"><ins><em>were tested by
security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed to detect</em></ins></span> a <span
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>test virus</a>. All</em></ins></span> of <span
class="removed"><del><strong>proprietary VPN apps from</strong></del></span>
<span class="inserted"><ins><em>them asked for dangerous
+ failed to detect a test virus</a>. All</em></ins></span> of <span
class="removed"><del><strong>the
+ promises</strong></del></span> <span class="inserted"><ins><em>them
asked</em></ins></span> for <span class="removed"><del><strong>privacy,
security, and anonymity given by</strong></del></span> <span
class="inserted"><ins><em>dangerous
permissions or contained advertising trackers, with seven being more
- risky than</em></ins></span> the <span
class="removed"><del><strong>research paper</strong></del></span> <span
class="inserted"><ins><em>average of the 100 most popular Android
apps.</p>
+ risky than</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN
apps—millions</strong></del></span> <span
class="inserted"><ins><em>average</em></ins></span> of <span
class="removed"><del><strong>users may be unawarely
subject</strong></del></span> <span class="inserted"><ins><em>the 100 most
popular Android apps.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> the
<span class="removed"><del><strong>privacy of
- users:</p>
+ <p><small>(Note that the article refers</em></ins></span> to
<span class="removed"><del><strong>poor security guarantees and abusive
practices inflicted by
+ VPN apps.”</p>
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>article
refers</em></ins></span> to <span class="removed"><del><strong>track
users</strong></del></span> <span class="inserted"><ins><em>these proprietary
apps as
+ <p>Following is a non-exhaustive list of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>VPN</strong></del></span> apps <span
class="removed"><del><strong>from
+ the research paper that tracks</strong></del></span> <span
class="inserted"><ins><em>as
“free”. It should have said “gratis”
instead.)</small></p>
</li>
<li id="M201807100">
- <p>Siri, Alexa,</em></ins></span> and <span
class="removed"><del><strong>show</strong></del></span> <span
class="inserted"><ins><em>all the other voice-control systems can be <a
+ <p>Siri, Alexa,</em></ins></span> and <span
class="removed"><del><strong>infringes</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>privacy of
+ users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries</strong></del></span> <span
class="inserted"><ins><em>other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -1151,8 +1153,8 @@
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show</em></ins></span> them targeted
ads.</dd>
+ <dd>Includes tracking libraries</em></ins></span> such as NativeX
and Appflood,
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -1655,7 +1657,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- malware-mobiles.de.po 8 Jan 2021 15:04:05 -0000 1.146
+++ malware-mobiles.de.po 12 Jan 2021 09:03:13 -0000 1.147
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -350,12 +350,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><h3>
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- malware-mobiles.es.po 9 Jan 2021 10:59:51 -0000 1.207
+++ malware-mobiles.es.po 12 Jan 2021 09:03:13 -0000 1.208
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -261,13 +262,32 @@
msgstr "Adicciones"
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Muchos populares juegos para móviles están basados en el sistema "
"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- malware-mobiles.fr.po 8 Jan 2021 16:10:45 -0000 1.221
+++ malware-mobiles.fr.po 12 Jan 2021 09:03:13 -0000 1.222
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-08 17:08+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -258,13 +259,32 @@
msgstr "Addiction"
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Beaucoup de jeux populaires sur mobiles sont basés sur le système
<i>gacha</"
"i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-mobiles.it-diff.html 8 Jan 2021 15:04:05 -0000 1.95
+++ malware-mobiles.it-diff.html 12 Jan 2021 09:03:13 -0000 1.96
@@ -220,7 +220,7 @@
<ul>
<li>
- <p>Siri, Alexa, and all</strong></del></span> the <span
class="removed"><del><strong>other voice-control systems
can</strong></del></span>
+ <p>Siri, Alexa, and all</strong></del></span> the <span
class="removed"><del><strong>other voice-control systems</strong></del></span>
<span class="inserted"><ins><em>back door, but at least it is unable to
turn the phone unto a
listening device.</p>
@@ -253,12 +253,13 @@
<ul class="blurbs">
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
</ul>
@@ -950,7 +951,7 @@
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't</em></ins></span> be <span
class="inserted"><ins><em>tracked—pay cash!</p>
+ <p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
@@ -990,8 +991,8 @@
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
@@ -999,26 +1000,26 @@
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat
users</em></ins></span> in <span
class="removed"><del><strong>ultrasound</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ public, so we</em></ins></span> can <span
class="removed"><del><strong>be</strong></del></span> <span
class="inserted"><ins><em>depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>humans can't hear</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>play
commands in ultrasound</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>humans can't hear</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -1657,7 +1658,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:13 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- malware-mobiles.it.po 8 Jan 2021 15:04:05 -0000 1.146
+++ malware-mobiles.it.po 12 Jan 2021 09:03:13 -0000 1.147
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -330,12 +330,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><h3>
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.ja-diff.html 8 Jan 2021 15:04:05 -0000 1.113
+++ malware-mobiles.ja-diff.html 12 Jan 2021 09:03:13 -0000 1.114
@@ -210,8 +210,8 @@
<span class="inserted"><ins><em>has the power</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
<span class="inserted"><ins><em>rewrite the software for the main processor
too.</p>
- <p>A few phone models are specially designed so
that</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>modem
- processor does not control the microphone,</em></ins></span> and <span
class="removed"><del><strong>you should</strong></del></span> <span
class="inserted"><ins><em>so that it can't
+ <p>A few phone models are specially designed so that the modem
+ processor does not control</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>microphone,</em></ins></span> and <span
class="removed"><del><strong>you should</strong></del></span> <span
class="inserted"><ins><em>so that it can't
change the software in the main processor. They still</em></ins></span>
have the <span class="removed"><del><strong>right</strong></del></span>
<span class="inserted"><ins><em>back door, but at least it is
unable</em></ins></span> to
<span class="removed"><del><strong>decide who (if
anyone)</strong></del></span> <span class="inserted"><ins><em>turn the phone
unto a
@@ -230,7 +230,7 @@
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"></em></ins></span>
transmit <span class="removed"><del><strong>personal data in an insecure
way</a>.
However,</strong></del></span> <span class="inserted"><ins><em>even when they
are turned off</a>. This means their movements
- are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>worse aspect of these</strong></del></span> <span
class="inserted"><ins><em>listening feature work.</p>
+ are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>worse aspect of</strong></del></span> <span
class="inserted"><ins><em>listening feature work.</p>
</li>
</ul>
@@ -256,12 +256,13 @@
<ul class="blurbs">
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
</ul>
@@ -1001,7 +1002,7 @@
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these apps, and study
+ <p>Google could demand the source code for</em></ins></span> these
<span class="inserted"><ins><em>apps, and study
the source code somehow to determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
@@ -1509,7 +1510,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/08 15:04:05 $
+$Date: 2021/01/12 09:03:13 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-mobiles.ja.po 8 Jan 2021 15:04:05 -0000 1.137
+++ malware-mobiles.ja.po 12 Jan 2021 09:03:13 -0000 1.138
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -270,12 +270,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><h3>
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.pot 8 Jan 2021 15:04:05 -0000 1.112
+++ malware-mobiles.pot 12 Jan 2021 09:03:13 -0000 1.113
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -205,11 +205,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
"
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
msgstr ""
#. type: Content of: <div><div><h3>
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- malware-mobiles.ru.po 10 Jan 2021 08:31:39 -0000 1.255
+++ malware-mobiles.ru.po 12 Jan 2021 09:03:13 -0000 1.256
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -255,13 +256,32 @@
msgstr "ÐавиÑимоÑÑÑ"
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
"иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов в
игÑовÑе авÑомаÑÑ Ñ 2010 года. "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- nl.po 11 Jan 2021 09:34:35 -0000 1.267
+++ nl.po 12 Jan 2021 09:03:13 -0000 1.268
@@ -3562,7 +3562,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3596,11 +3596,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2015, 2016-] {+2017-2020+} Free Software Foundation,
+# | Copyright © [-2015, 2016-] {+2017-2021+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3836,12 +3836,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4534,6 +4535,14 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2015, 2016-] {+2017-2020+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
# | Free Software Foundation
@@ -6996,7 +7005,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -7073,9 +7082,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- pl.po 11 Jan 2021 09:34:35 -0000 1.266
+++ pl.po 12 Jan 2021 09:03:13 -0000 1.267
@@ -3135,7 +3135,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3169,11 +3169,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2017-2020+} Free Software
+# | Copyright © [-2013, 2014, 2015-] {+2017-2021+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3410,12 +3410,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4058,6 +4059,14 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2017-2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
# | Free Software Foundation
@@ -6452,7 +6461,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -6529,9 +6538,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- pot 11 Jan 2021 09:34:35 -0000 1.265
+++ pot 12 Jan 2021 09:03:13 -0000 1.266
@@ -2914,7 +2914,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -2948,7 +2948,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
@@ -3180,12 +3180,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -3817,6 +3818,10 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
msgstr ""
@@ -6135,7 +6140,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -6212,9 +6217,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
Index: proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary-addictions.es.po 9 Jan 2021 10:59:52 -0000 1.65
+++ proprietary-addictions.es.po 12 Jan 2021 09:03:13 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -114,9 +115,21 @@
msgstr "Juegos"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -219,17 +232,22 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"Las «cajas de botÃn» (<cite>loot boxes</cite>) son una aplicación directa
"
"del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
"seductoras animaciones. Son <a href=\"https://www.pcgamer.com/behind-the-"
"addictive-psychology-and-seductive-art-of-loot-boxes/\">semejantes a los "
-"juegos de apuestas</a>, al igual que los <a href=\"https://es.wikipedia.org/"
-"wiki/Videojuego_gacha\">juegos <cite>gacha</cite></a>, muy populares en "
-"Asia, que pueden considerarse los precursores de las «cajas de botÃn»."
+"juegos de apuestas</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
#. type: Content of: <div><div><ul><li>
msgid ""
@@ -590,13 +608,32 @@
"convertirse en una costosa adicción."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Muchos populares juegos para móviles están basados en el sistema "
"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
Index: proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-addictions.fr.po 8 Jan 2021 16:10:45 -0000 1.72
+++ proprietary-addictions.fr.po 12 Jan 2021 09:03:13 -0000 1.73
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-08 17:08+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -109,9 +110,21 @@
msgstr "Jeux"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -209,13 +222,28 @@
msgstr "Il y a des moyens encore plus élaborés de rendre les jeux addictifs."
#. type: Content of: <div><div><ul><li>
+# | “Loot boxes” are a direct application of the random reward
+# | mechanism, and their addictiveness is enhanced by seductive animation.
+# | They are <a
+# |
href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">
+# | akin to [-gambling</a>, and so are the <a
+# | href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very
+# | popular in Asia, which may be considered the ancestors of loot boxes.-]
+# | {+gambling</a>.+}
+#, fuzzy
+#| msgid ""
+#| "“Loot boxes” are a direct application of the random reward "
+#| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
+#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#| "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#| "a>, very popular in Asia, which may be considered the ancestors of loot "
+#| "boxes."
msgid ""
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"Les « boîtes à butin » sont une application directe du mécanisme de "
"récompense aléatoire. De plus leur pouvoir addictif est amplifié par des "
@@ -227,6 +255,15 @@
#. type: Content of: <div><div><ul><li>
msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
"The developers of gratis mobile games apply the techniques described above "
"to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/"
"\"> turn their products into slot machines</a>. This is clearly described in "
@@ -580,13 +617,32 @@
"en obtenir plus, ce qui peut devenir coûteux à la longue."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Beaucoup de jeux populaires sur mobiles sont basés sur le système
<i>gacha</"
"i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
Index: proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary-addictions.pot 8 Jan 2021 15:04:06 -0000 1.35
+++ proprietary-addictions.pot 12 Jan 2021 09:03:13 -0000 1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -95,7 +95,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a "
+"spending money on the game. To achieve this result, developers use <a "
"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
"
"techniques that derive from behavioral and brain research</a>:"
msgstr ""
@@ -172,9 +172,16 @@
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a "
"href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\">
"
-"akin to gambling</a>, and so are the <a "
-"href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular "
-"in Asia, which may be considered the ancestors of loot boxes."
+"akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
@@ -407,11 +414,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
"
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary-addictions.ru.po 10 Jan 2021 08:31:39 -0000 1.64
+++ proprietary-addictions.ru.po 12 Jan 2021 09:03:13 -0000 1.65
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -111,9 +112,21 @@
msgstr "ÐгÑÑ"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -214,16 +227,21 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"“ÐÑÑбокÑÑ” пÑедÑÑавлÑÑÑ Ð¿ÑÑмое
пÑиложение меÑ
анизма ÑлÑÑайного "
"вознагÑаждениÑ, а завиÑимоÑÑÑ Ð¾Ñ Ð½Ð¸Ñ
повÑÑаеÑÑÑ Ð¿Ð¾ÑÑедÑÑвом ÑоблазниÑелÑной "
"мÑлÑÑипликаÑии. ÐÑо <a
href=\"https://www.pcgamer.com/behind-the-addictive-"
-"psychology-and-seductive-art-of-loot-boxes/\"> ÑÑодни азаÑÑнÑм
игÑам</a>, "
-"Ñакже как <a
href=\"https://wikipedia.org/wiki/Gacha_game\">гаÑа-игÑÑ</a>, "
-"оÑÐµÐ½Ñ Ð¿Ð¾Ð¿ÑлÑÑнÑе в Ðзии, коÑоÑÑÑ
можно
ÑÑиÑаÑÑ Ð¿ÑедÑеÑÑвенниками лÑÑбокÑов."
+"psychology-and-seductive-art-of-loot-boxes/\"> ÑÑодни азаÑÑнÑм
игÑам</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
#. type: Content of: <div><div><ul><li>
msgid ""
@@ -575,13 +593,32 @@
"пÑевÑаÑиÑÑÑÑ Ð² доÑогоÑÑоÑÑÑÑ Ð¿ÑивÑÑкÑ."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
"иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов в
игÑовÑе авÑомаÑÑ Ñ 2010 года. "
Index: proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-addictions.tr.po 8 Jan 2021 15:04:06 -0000 1.30
+++ proprietary-addictions.tr.po 12 Jan 2021 09:03:13 -0000 1.31
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-01-08 14:56+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-10-29 17:46+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -108,9 +108,16 @@
msgstr "Oyunlar"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -208,19 +215,11 @@
"yolları da vardır."
#. type: Content of: <div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "“Loot boxes” are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgid ""
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"“YaÄma sandıkları”, rastgele ödül mekanizmasının doÄrudan
bir "
"uygulamasıdır ve baÄımlılık yapıcılıkları baÅtan çıkarıcı
animasyon ile "
@@ -230,6 +229,15 @@
#. type: Content of: <div><div><ul><li>
msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
"The developers of gratis mobile games apply the techniques described above "
"to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/"
"\"> turn their products into slot machines</a>. This is clearly described in "
@@ -582,12 +590,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-surveillance.de-diff.html 11 Jan 2021 09:34:35 -0000
1.155
+++ proprietary-surveillance.de-diff.html 12 Jan 2021 09:03:13 -0000
1.156
@@ -1479,8 +1479,8 @@
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or <span
class="removed"><del><strong>Android
- users,</strong></del></span> <span class="inserted"><ins><em>Android users,
+ <span class="removed"><del><strong>cheating? There is no systematic way
for Google,</strong></del></span>
+ <span class="inserted"><ins><em>cheating? There is no systematic way for
Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
@@ -1508,7 +1508,8 @@
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ to ultrasound from beacons placed in stores</em></ins></span> or <span
class="removed"><del><strong>Android
+ users,</strong></del></span> <span class="inserted"><ins><em>played by TV
programs</a>.</p>
</li>
@@ -1533,10 +1534,9 @@
<p>The suit accuses that this was done without the users'
consent.</em></ins></span>
If <span class="removed"><del><strong>it did a good
job</strong></del></span> <span class="inserted"><ins><em>the fine
print</em></ins></span> of <span class="inserted"><ins><em>the app said that
users gave consent for</em></ins></span> this,
<span class="inserted"><ins><em>would that make</em></ins></span> it <span
class="removed"><del><strong>could more or less
- prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to
design</em></ins></span>
- the app <span class="removed"><del><strong>developers are clever
- enough</strong></del></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
+ prevent such snooping, except</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
</li>
<li id="M201704074">
@@ -1550,16 +1550,18 @@
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot
trust</strong></del></span> <span class="inserted"><ins><em>same information
- about the users' searches that</em></ins></span> Google <span
class="removed"><del><strong>to protect us. We</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
user</em></ins></span> must <span class="removed"><del><strong>demand
release</strong></del></span>
- <span class="inserted"><ins><em>explicitly opt-in before the app takes
effect. However, the app
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before</em></ins></span> the app <span
class="removed"><del><strong>developers are clever
+ enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>takes effect. However,</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release</strong></del></span> <span
class="inserted"><ins><em>app
remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
@@ -1625,10 +1627,11 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5 tracking libraries. Developers of this app
have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
+ <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking <span class="inserted"><ins><em>the user</em></ins></span> and
<span class="removed"><del><strong>display</strong></del></span> <span
class="inserted"><ins><em>displaying</em></ins></span> ads.</dd>
+ <span class="removed"><del><strong></dl>
</li>
<li>
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
@@ -1660,32 +1663,29 @@
<li>
<p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends</strong></del></span>
- <span class="inserted"><ins><em>five tracking libraries. Developers of
this</em></ins></span> app <span class="removed"><del><strong>developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>have confirmed that</em></ins></span>
- the <span class="removed"><del><strong>personal
details</strong></del></span> <span class="inserted"><ins><em>non-premium
version</em></ins></span> of <span class="removed"><del><strong>users that
install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
- tracking</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>user and displaying
ads.</dd>
- </dl>
+ data to servers.</strong></del></span>
+ <span class="inserted"><ins><em></dl>
</li>
<li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
</li>
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to
who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
+ and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
<span class="inserted"><ins><em>in the frame.</p>
<p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
@@ -1712,15 +1712,15 @@
even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable</strong></del></span> <span
class="inserted"><ins><em>service.</p>
+ when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them</em></ins></span>
with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ it may</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve them with
targeted
advertisements.</p></em></ins></span>
</li>
@@ -1757,11 +1757,11 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ that <span class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>snoop are just as wrong as any other
snooping.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201510300">
+ <li id="M201510300">
<p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
@@ -1796,10 +1796,11 @@
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201505060">
+ <span class="inserted"><ins><em><li id="M201505060">
<p>Gratis</em></ins></span> Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
@@ -1921,32 +1922,34 @@
<p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>user's computer,</em></ins></span> but <span
class="removed"><del><strong>it's active by default so</strong></del></span> it
<span class="removed"><del><strong>still counts as a</strong></del></span>
<span class="inserted"><ins><em>does</em></ins></span> surveillance <span
class="removed"><del><strong>functionality.</p>
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to get <span class="removed"><del><strong>at
them, but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>the user's list</em></ins></span> of <span
class="removed"><del><strong>them through</strong></del></span> <span
class="inserted"><ins><em>other people's phone
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list</em></ins></span> of <span
class="inserted"><ins><em>other people's phone
numbers</a>.</p>
</li>
<li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
- <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong><a class="not-a-duplicate"
+ <p>The FTC criticized</em></ins></span> this <span
class="inserted"><ins><em>app because it asked the user</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span>
+ <span class="inserted"><ins><em>approve sending personal
data</em></ins></span> to <span class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>the app
developer but did not ask
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong><a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>user to
- approve sending personal data to</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get</strong></del></span> <span class="inserted"><ins><em>app
developer but did not ask
- about sending it to</em></ins></span> other <span
class="removed"><del><strong>info too.</p>
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>weakness
of</em></ins></span>
+ the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
</li>
- <li><p>There is also</strong></del></span> <span
class="inserted"><ins><em>companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <li><p>There is also</strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should</em></ins></span> a <span
class="removed"><del><strong>feature for web sites</strong></del></span> <span
class="inserted"><ins><em>flashlight app send any information</em></ins></span>
to <span class="removed"><del><strong>track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it
@@ -2101,34 +2104,24 @@
<p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>lot</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
- can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
<li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
- to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -2136,60 +2129,65 @@
More about NSA app spying</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by</strong></del></span>
<span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on
- <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to</strong></del></span> <span class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities
which</em></ins></span>
- have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
+ <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>hidden
+ “cheating-prevention” program</em></ins></span> that <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
<ul class="blurbs">
<li id="M202101050">
- <p>Most Internet connected devices in Mozilla's <a
-
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed</em></ins></span> to <span class="removed"><del><strong>restrict
- the use</strong></del></span> <span class="inserted"><ins><em>snoop on
users</a> even if they meet
+ designed to snoop</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>users</a>
even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the program running</em></ins></span> on <span
class="inserted"><ins><em>some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
- the <span class="removed"><del><strong>user's computer, but it does
surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>user
susceptible to be snooped and exploited by crackers as
- well</a>.</p>
- </li>
-
- <li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>snoop on the people that use them</a>.</p>
+ design of the program running on some of these devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>be snooped and exploited by crackers as
+ well</a>.</p></em></ins></span>
+ </li>
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on the people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject all the stings.</p>
+
+ <p><small>(It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
@@ -2221,115 +2219,113 @@
<li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
- every <span class="removed"><del><strong>move</a>.</p>
+ every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p></em></ins></span>
</li>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>second of
what</em></ins></span> the <span class="removed"><del><strong>words
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO,</em></ins></span> and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>user's address
+ book</strong></del></span> <span class="inserted"><ins><em>return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>user is
watching</a>. This is illegal due</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
</li>
<li>
- <p>Facebook's app listens all</strong></del></span>
- the <span class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act of 1988, but they're circumventing</em></ins></span>
- it <span class="removed"><del><strong>may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>through EULAs.</p></em></ins></span>
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
+ to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is to get your own router (which
can</em></ins></span>
+ be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>an old
computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>serve
them</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
+ you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>another model.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal
data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a></em></ins></span> in
the <span class="removed"><del><strong>device</a>.
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
</p>
</li>
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information about</strong></del></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
+ announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness</em></ins></span> of <span class="removed"><del><strong>its
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to
Netflix.</em></ins></span> The <span
class="inserted"><ins><em>Netflix</em></ins></span> app <span
class="removed"><del><strong>will give Verizon the same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
- <p>What is supposed to make this spying acceptable, according to him,
- is</em></ins></span> that <span class="removed"><del><strong>Google
normally gets when
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
they use its search engine.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
- <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>scenes,
- and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>app takes
effect. However,</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter),</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is
- <span class="removed"><del><strong>still spyware.</p>
+ <p>Currently, the app</strong></del></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+ still spyware.</p>
</li>
<li><p>The Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- to <span class="inserted"><ins><em>disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+ user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>terrestrial
antenna
- instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>only</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
- if you are technically oriented, is to get your own router
(which</em></ins></span> can <span class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone,</strong></del></span>
- <span class="inserted"><ins><em>be an old computer running completely free
software),</em></ins></span> and <span class="removed"><del><strong>in server
accounts, it</strong></del></span> <span class="inserted"><ins><em>set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you</em></ins></span> can
- <span class="removed"><del><strong>alter them too</a>.
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>way to disable</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if</em></ins></span> it
<span class="removed"><del><strong>can
+ alter them too</a>.
</p></li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>replace your TV with another model.</p>
- </li>
-
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
- <p>This example illustrates how
“getting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>article</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the facts it presents. It</em></ins></span>
- is <span class="removed"><del><strong>inadequate as a protection against
massive
- surveillance.</p>
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>were not hidden</em></ins></span> as <span
class="removed"><del><strong>a protection against massive</strong></del></span>
<span class="inserted"><ins><em>it was in these TVs,
+ does not legitimize the</em></ins></span> surveillance.</p>
</li>
- <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports</em></ins></span> what <span
class="removed"><del><strong>radio</strong></del></span> <span
class="inserted"><ins><em>it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
- </li>
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
- <li id="M201511130">
+ <span class="inserted"><ins><em><li id="M201511130">
<p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
sounds to be picked up by proprietary malware running</em></ins></span>
@@ -2379,14 +2375,13 @@
<p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people</em></ins></span> are <span
class="removed"><del><strong>private
- anymore,</strong></del></span> <span
class="inserted"><ins><em>watching</a>,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload” them to the
service.</p>
+ anymore,</strong></del></span> <span
class="inserted"><ins><em>watching</a>,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>it
isn't a TV channel.</p></em></ins></span>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>it isn't
a TV channel.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based</strong></del></span>
- <li id="M201505290">
+ <span class="inserted"><ins><em><li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>what
programs people watch,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
@@ -2447,11 +2442,11 @@
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many proprietary apps for mobile
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps</strong></del></span> <span class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed
to</em></ins></span> report <span class="removed"><del><strong>which other
- apps</strong></del></span> <span class="inserted"><ins><em>what the
+ <p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
</li>
@@ -2638,12 +2633,12 @@
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+ conversations was unacceptable <span class="removed"><del><strong>by
itself.</p></li>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnSmartWatches -->
@@ -2658,110 +2653,66 @@
<ul>
<li>
- <p>An LG</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed
+ <p>An LG “smart” watch is designed
<a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>i-Que</em></ins></span> transmit
- <span class="removed"><del><strong>conversations
too</a>.</p>
+ to report its location to someone else and to transmit
+ conversations too</a>.</p>
</li>
<li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
- company based</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
- <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>the U.S.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span> <span class="inserted"><ins><em>by itself.</p>
+ </li>
+
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site in China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>back door, but that could
be</strong></del></span> <span class="inserted"><ins><em>speech recognition
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>back door, but that could be</strong></del></span>
<span class="inserted"><ins><em>mobile phone. This would enable
- crackers to listen in on</em></ins></span> a
+ can remotely control the toys with</em></ins></span> a
<span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ least.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
- </li>
-</ul></em></ins></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
- </li>
-</ul></em></ins></span>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
-
- <li id="M202008030">
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means the devices now listen for more
- than just their wake words. Google says the software update was sent
- out prematurely</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>accident and Google
was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> on <span
class="removed"><del><strong>Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>child's
speech, and even speak into the
+ toys themselves.</p>
</li>
- <li id="M202006300">
- <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span class="removed"><del><strong>specific sabotage
method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
- <span class="inserted"><ins><em>bosses can spy on them.</p>
-
- <p>This shows why requiring the user's
“consent”</em></ins></span> is not <span
class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+ <li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>an adequate basis for protecting digital
privacy. The boss can coerce
- most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2775,99 +2726,134 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>almost anything, even probable exposure
- to contagious disease that</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.
Software like</em></ins></span> this <span class="removed"><del><strong>way,
because they pass</strong></del></span> <span class="inserted"><ins><em>should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
Microsoft changed Skype
<a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
+ specifically for spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201911190">
- <p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ </li>
+</ul></em></ins></span>
+
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
- <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>the household
- through connected surveillance devices.</p>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can
communicate</strong></del></span> <span class="inserted"><ins><em>the devices
implemented proper
- security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>it,</strong></del></span> <span
class="inserted"><ins><em>proprietary
- software lack this. Of course, they are also used by their
- manufacturers for snooping.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202009270">
+ <p>Many employers are using nonfree
+ software, including videoconference software, to <a
+
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that</em></ins></span> is <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="inserted"><ins><em>malicious</em></ins></span>
+ surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>feature.</p>
</li>
- <li id="M201907210">
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it</em></ins></span> is <span class="inserted"><ins><em>not supposed
to listen</a>. Thus, when one of Google's
- subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
+ <li id="M202008030">
+ <p>Google Nest</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
+ is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ listens for things like smoke alarms</a> and then notifies your phone
+ that</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the
<span class="removed"><del><strong>manufacturer, based on</strong></del></span>
<span class="inserted"><ins><em>devices now listen for more
+ than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>software update was sent
+ out prematurely and on accident and Google was planning on disclosing
+ this new feature and offering it to customers who pay for it.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
+ <span class="inserted"><ins><em>bosses can spy on them.</p>
- <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>no
- way to see or control what it records or sends.</p>
-
- <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
- get commands</em></ins></span> that the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that the device gives the company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ </li>
+
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>The Nest Cam “smart” camera</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than</em></ins></span> is <span class="removed"><del><strong><a
+ <span class="inserted"><ins><em><li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong><a
href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
- recordings made without a legitimate prompt), and sends</em></ins></span>
- it <span class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's
servers, which store it indefinitely. Even
- worse, Amazon forwards</em></ins></span> it to <span
class="removed"><del><strong>outsmart
+ watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>no
+ way to see or control what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
you.</p>
</li>
</ul>
@@ -2879,24 +2865,21 @@
<ul>
<li><p>E-books can contain JavaScript code,
- and</strong></del></span> <span class="inserted"><ins><em>third-party
companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
- advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>user
reads at what time</a>.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the user <span
class="removed"><del><strong>reads at what time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed to check DRM!</p>
+ send lots of data</strong></del></span> <span
class="inserted"><ins><em>wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
</ul>
@@ -2908,23 +2891,33 @@
<ul>
<li><p>Computerized cars with nonfree software are
<a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
</li>
- <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell
phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span class="inserted"><ins><em>collecting it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>make changes in various
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+ even if <span class="removed"><del><strong>it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
the devices are tethered to. Moreover, they are made available to
Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
@@ -3279,7 +3272,7 @@
data remotely</em></ins></span> and <span
class="removed"><del><strong>would then have to
give</strong></del></span> <span class="inserted"><ins><em>determine the
car's location
at any time. (See Section 2, paragraphs b and c of the <a
-
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
information, but if the state orders</em></ins></span> it to <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
<p>Speech recognition is not to be trusted
unless</strong></del></span> <span class="inserted"><ins><em>data and
hand</em></ins></span> it <span class="removed"><del><strong>is done
@@ -3918,7 +3911,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- proprietary-surveillance.de.po 11 Jan 2021 09:34:35 -0000 1.368
+++ proprietary-surveillance.de.po 12 Jan 2021 09:03:13 -0000 1.369
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5162,7 +5162,7 @@
# | car's location at any time. (See [-<a
# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
+# |
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
# | privacy statement</a>.)+} The company says it doesn't store this
# | information, but if the state orders it to get the data and hand it over,
# | the state can store it.
@@ -5177,7 +5177,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.es.po 11 Jan 2021 09:34:35 -0000 1.133
+++ proprietary-surveillance.es.po 12 Jan 2021 09:03:13 -0000 1.134
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-06 13:11+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -4684,10 +4684,25 @@
"del móvil."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.587
retrieving revision 1.588
diff -u -b -r1.587 -r1.588
--- proprietary-surveillance.fr.po 11 Jan 2021 12:25:24 -0000 1.587
+++ proprietary-surveillance.fr.po 12 Jan 2021 09:03:15 -0000 1.588
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-11 13:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -4692,10 +4693,25 @@
"physiquement."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.it-diff.html 11 Jan 2021 09:34:35 -0000
1.221
+++ proprietary-surveillance.it-diff.html 12 Jan 2021 09:03:15 -0000
1.222
@@ -2784,9 +2784,8 @@
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest
thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
you.</p>
</li>
</ul>
@@ -2797,7 +2796,8 @@
</div>
<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
</li>
@@ -2900,36 +2900,36 @@
<li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
-
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.)</small></p>
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information,</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers are probably hackers
too,</em></ins></span> but <span class="removed"><del><strong>if the state
orders it</strong></del></span> <span class="inserted"><ins><em>please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>get the</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
- <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ sending usage</em></ins></span> data
+ <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>back
over</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201706204">
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>everyone in the
house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
+ a device that can obey your voice commands without potentially
spying</em></ins></span>
on <span class="removed"><del><strong>top under each subsection -->
<div class="big-section">
@@ -3016,7 +3016,7 @@
<p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>and from the watch, possibly
endangering</em></ins></span> the <span class="removed"><del><strong>user
watches — no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -3146,14 +3146,14 @@
<p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="inserted"><ins><em>easily by
sneaking it into</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for some digital service
+ <span class="removed"><del><strong>transmission reports a 404
error</strong></del></span> <span class="inserted"><ins><em>contract that users
sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
<p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want to be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>server
+ <p>But if you</em></ins></span> really <span
class="removed"><del><strong>means nothing;</strong></del></span> <span
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span>
the <span class="removed"><del><strong>server
could save</strong></del></span> <span class="inserted"><ins><em>car's
hardware cannot collect any of that data, or</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
@@ -3220,21 +3220,20 @@
enables</em></ins></span> the <span class="removed"><del><strong>app said
that users gave consent for this,
would that make it acceptable? No way! It should be flat out
<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>phone company to
track the car's movements all the time;
- it is possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p>
+illegal</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
+ it is possible</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>physically
remove the cell phone modem, though.</p></em></ins></span>
</li>
- <li id="M201306140">
- <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>extract
- data remotely and determine the car's location</em></ins></span>
- at <span class="removed"><del><strong>all</a>.
-</p>
-</li>
-
- <li><p>Many
+ <span class="removed"><del><strong><li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>any time. (See Section 2, paragraphs
b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
-
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ video game consoles snoop on their users</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company to extract
+ data remotely</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>determine the car's location
+ at any time. (See Section 2, paragraphs b and c of the <a
+
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
@@ -3747,7 +3746,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary-surveillance.it.po 11 Jan 2021 09:34:35 -0000 1.380
+++ proprietary-surveillance.it.po 12 Jan 2021 09:03:15 -0000 1.381
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4837,7 +4837,7 @@
# | car's location at any time. (See [-<a
# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
+# |
href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
# | privacy statement</a>.)+} The company says it doesn't store this
# | information, but if the state orders it to get the data and hand it over,
# | the state can store it.
@@ -4852,7 +4852,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-surveillance.ja-diff.html 11 Jan 2021 09:34:35 -0000
1.239
+++ proprietary-surveillance.ja-diff.html 12 Jan 2021 09:03:15 -0000
1.240
@@ -1490,59 +1490,57 @@
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
Section 2, paragraphs b and c.</a>). The company says it doesn't
store this information,</strong></del></span> <span
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it to get the data
- and hand</strong></del></span> <span class="inserted"><ins><em>cannot
make</em></ins></span> it <span class="removed"><del><strong>over, the state
can store it.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
+ and hand it over, the state can store it.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>cannot</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202003260">
- <p>The Apple iOS version of Zoom <a
-
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users' data</em></ins></span> to <span
class="removed"><del><strong>spy on their renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it less nasty.</p></em></ins></span>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>Facebook</a> even if the user doesn't
have</em></ins></span>
- a <span class="removed"><del><strong>woman came up</strong></del></span>
<span class="inserted"><ins><em>Facebook account. According</em></ins></span>
to <span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the article, Zoom</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span>
- don't <span class="removed"><del><strong>know. You can't see out the other
way.” Evidently that was
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul>
<li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>even mention this
surveillance</em></ins></span> on their <span
class="removed"><del><strong>users</a>.</p>
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></strong></del></span>
- <p>The report was as of 2014, but we don't
expect</strong></del></span> <span class="inserted"><ins><em>privacy policy
page,
- making</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202003260"></em></ins></span>
+ <p>The <span class="removed"><del><strong>report was
as</strong></del></span> <span class="inserted"><ins><em>Apple iOS
version</em></ins></span> of <span class="removed"><del><strong>2014, but we
don't expect this has got better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
+ <p>This shows that laws requiring products to
get</strong></del></span> <span class="inserted"><ins><em>Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending</em></ins></span> users' <span class="removed"><del><strong>formal
+ consent before collecting personal</strong></del></span> data <span
class="removed"><del><strong>are totally inadequate.
+ And what happens</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a> even</em></ins></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>user doesn't have
+ a Facebook account. According</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
not work.”</p>
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>an obvious violation
of people's privacy even in their
+ <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>article, Zoom and
Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
own terms.</p>
</li>
@@ -1574,68 +1572,53 @@
reason</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
<p><small>Note:</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>article uses the word “free” in
- the sense of
“gratis.”</small></p></em></ins></span>
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households
to</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>600 millions
social media</strong></del></span> <span class="inserted"><ins><em>word
“free” in
+ the sense of “gratis.”</small></p>
+ </li>
- <span class="inserted"><ins><em><li id="M201912090">
+ <li id="M201912090">
<p>iMonsters and Android phones,
when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand</em></ins></span> to <span
class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span>
- <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
and as dangerous as any other nonfree software.</p>
</li>
<li id="M201910130">
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing
all</strong></del></span> <span class="inserted"><ins><em>Great Nation”
app requires</em></ins></span> users to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>grant it <a
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages,
contacts,</em></ins></span> and <span class="removed"><del><strong>TV
advertisements play inaudible sounds</strong></del></span>
- <span class="inserted"><ins><em>internet history</a>, and the
Android version was found</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>contain a
- back-door allowing developers</em></ins></span> to <span
class="removed"><del><strong>determine that</strong></del></span> <span
class="inserted"><ins><em>run any code</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>wish in the users'
- phone, as “superusers.” Downloading</em></ins></span> and
- <span class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>using this
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs
recognize</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
saying that the tests were only performed on the Android version
- of the app,</em></ins></span> and <span class="inserted"><ins><em>that,
according to Apple, “this kind of
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
<li id="M201909091">
- <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> it <span
class="removed"><del><strong>isn't a TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>is
turned off</a>, after tricking them
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>, after tricking them
into giving the app broad permissions in order to use one of its
- functionalities.</p></em></ins></span>
+ functionalities.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>listening
all</strong></del></span> <span class="inserted"><ins><em>Maya <a
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
send intimate details of users' lives to Facebook</a>.</p>
</li>
@@ -2502,8 +2485,10 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
+ to the 600 millions social media</em></ins></span> profiles the company
<span class="removed"><del><strong>already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing</strong></del></span>
+ <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
@@ -3082,7 +3067,7 @@
<p>Tesla cars allow the company to extract
data remotely and determine the car's location
at any time. (See Section 2, paragraphs b and c of the <a
-
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
information, but if the state orders it to get the data and hand it
over, the state can store it.</p>
@@ -3091,13 +3076,14 @@
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
+ records</em></ins></span> information <span
class="inserted"><ins><em>about drivers' movements</a>, which is made
available to car manufacturers, insurance companies, and others.</p>
<p>The case of toll-collection systems, mentioned in this article,
is not really a matter of proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but the invasion isn't done by malware. The
+ are an intolerable invasion of privacy, and should be
replaced</em></ins></span> with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>anonymous payment systems, but the
invasion isn't done by malware. The
other cases mentioned are done by proprietary malware in the car.</p>
</li>
</ul>
@@ -3110,8 +3096,9 @@
<ul class="blurbs">
<li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
</li>
@@ -3126,7 +3113,7 @@
<p>You can bet Facebook will implement the maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
- system with nonfree software in it.</p>
+ system</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing</strong></del></span> <span
class="inserted"><ins><em>nonfree software in it.</p>
</li>
</ul>
@@ -3142,50 +3129,60 @@
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance is an abuse all the same.</p>
+ but the surveillance is an abuse</em></ins></span> all <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>the same.</p>
<ul class="blurbs">
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
+ longer possible</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>disable an
unscrupulous tracking anti-feature</a> that <a
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
- going to be based on Chromium.</p>
+ Opera, Microsoft Edge</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>also in the
upcoming Microsoft Edge that is
+ going</em></ins></span> to be
+ <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span
class="inserted"><ins><em>based</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span
class="inserted"><ins><em>Chromium.</p>
</li>
<li id="M201901101">
<p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
+ sent the precise GPS location</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.</p>
+ on the reporters</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>use
it</a>.</p>
</li>
<li id="M201701060">
<p>When a page uses Disqus
- for comments, the proprietary Disqus software <a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ for comments, the proprietary Disqus software</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
a Facebook software package into the browser of every anonymous visitor
- to the page, and makes the page's URL available to
Facebook</a>.</p>
+ to the page, and makes the page's URL available to
Facebook</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <li id="M201612064">
- <p>Online sales, with tracking and surveillance of customers, <a
-
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>. Most of
+ <span class="inserted"><ins><em><li id="M201612064">
+ <p>Online sales, with tracking</em></ins></span> and <span
class="inserted"><ins><em>surveillance of customers,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different</em></ins></span> people <span
class="removed"><del><strong>are watching</a>,
+ even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>different prices</a>. Most of
the tracking is done by recording interactions with servers, but
- proprietary software contributes.</p>
+ proprietary software contributes.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201405140">
+ <span class="inserted"><ins><em><li id="M201405140">
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users'
@@ -3194,14 +3191,15 @@
<li id="M201210240">
<p>Many web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites, <a
-
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ networks that track users. Of the top 1000 web sites,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
<li id="M201208210">
- <p>Many web sites report all their visitors
+ <p>Many web sites report</em></ins></span> all <span
class="inserted"><ins><em>their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was
visited</a>.</p>
@@ -3635,7 +3633,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- proprietary-surveillance.ja.po 11 Jan 2021 09:34:35 -0000 1.362
+++ proprietary-surveillance.ja.po 12 Jan 2021 09:03:15 -0000 1.363
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3863,7 +3863,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary-surveillance.pot 11 Jan 2021 09:34:35 -0000 1.301
+++ proprietary-surveillance.pot 12 Jan 2021 09:03:15 -0000 1.302
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3150,7 +3150,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
"
"privacy statement</a>.) The company says it doesn't store this information, "
"but if the state orders it to get the data and hand it over, the state can "
"store it."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.671
retrieving revision 1.672
diff -u -b -r1.671 -r1.672
--- proprietary-surveillance.ru.po 11 Jan 2021 14:31:40 -0000 1.671
+++ proprietary-surveillance.ru.po 12 Jan 2021 09:03:15 -0000 1.672
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -4641,10 +4642,25 @@
"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary.de-diff.html 11 Jan 2021 09:34:35 -0000 1.216
+++ proprietary.de-diff.html 12 Jan 2021 09:03:15 -0000 1.217
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -225,12 +225,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -332,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:35 $
+$Date: 2021/01/12 09:03:15 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.de.po 11 Jan 2021 09:34:35 -0000 1.254
+++ proprietary.de.po 12 Jan 2021 09:03:16 -0000 1.255
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -481,12 +481,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary.es.po 11 Jan 2021 09:34:35 -0000 1.383
+++ proprietary.es.po 12 Jan 2021 09:03:16 -0000 1.384
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -348,13 +348,32 @@
"libertad computacional del usuario."
#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Muchos populares juegos para móviles están basados en el sistema "
"<cite>gacha</cite>, que ha estado convirtiendo los móviles en máquinas "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.429
retrieving revision 1.430
diff -u -b -r1.429 -r1.430
--- proprietary.fr.po 11 Jan 2021 12:25:24 -0000 1.429
+++ proprietary.fr.po 12 Jan 2021 09:03:16 -0000 1.430
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-11 13:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -339,13 +340,32 @@
"libertés numériques de l'utilisateur."
#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Beaucoup de jeux populaires sur mobiles sont basés sur le système
<i>gacha</"
"i>, qui transforme les téléphones en machines à sous depuis 2010. Le "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary.it-diff.html 11 Jan 2021 09:34:36 -0000 1.228
+++ proprietary.it-diff.html 12 Jan 2021 09:03:16 -0000 1.229
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -224,12 +224,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -331,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.it.po 11 Jan 2021 09:34:36 -0000 1.263
+++ proprietary.it.po 12 Jan 2021 09:03:16 -0000 1.264
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,12 +486,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary.ja-diff.html 11 Jan 2021 09:34:36 -0000 1.233
+++ proprietary.ja-diff.html 12 Jan 2021 09:03:16 -0000 1.234
@@ -62,8 +62,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -148,8 +148,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -164,8 +164,8 @@
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -223,12 +223,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -330,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary.ja.po 11 Jan 2021 09:34:36 -0000 1.247
+++ proprietary.ja.po 12 Jan 2021 09:03:16 -0000 1.248
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -344,12 +344,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.nl-diff.html 11 Jan 2021 09:34:36 -0000 1.229
+++ proprietary.nl-diff.html 12 Jan 2021 09:03:16 -0000 1.230
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -224,12 +224,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -331,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary.nl.po 11 Jan 2021 09:34:36 -0000 1.237
+++ proprietary.nl.po 12 Jan 2021 09:03:16 -0000 1.238
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -389,12 +389,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.pl-diff.html 11 Jan 2021 09:34:36 -0000 1.246
+++ proprietary.pl-diff.html 12 Jan 2021 09:03:16 -0000 1.247
@@ -154,19 +154,19 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -223,12 +223,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -330,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.pl.po 11 Jan 2021 09:34:36 -0000 1.230
+++ proprietary.pl.po 12 Jan 2021 09:03:16 -0000 1.231
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -570,12 +570,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary.pot 11 Jan 2021 09:34:36 -0000 1.227
+++ proprietary.pot 12 Jan 2021 09:03:16 -0000 1.228
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -279,11 +279,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a "
+"Many popular mobile games include a random-reward system called <a "
+"href=\"#gacha\"><i>gacha</i></a> which is especially effective on "
+"children. One variant of gacha was declared illegal in Japan in 2012, but "
+"the other variants are still <a "
"href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
"
-"the legal variants are still exploiting users</a>."
+"luring players into compulsively spending</a> inordinate amounts of money on "
+"virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary.pt-br.po 11 Jan 2021 09:34:36 -0000 1.377
+++ proprietary.pt-br.po 12 Jan 2021 09:03:16 -0000 1.378
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-05 16:36-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -342,12 +342,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.455
retrieving revision 1.456
diff -u -b -r1.455 -r1.456
--- proprietary.ru.po 11 Jan 2021 14:31:40 -0000 1.455
+++ proprietary.ru.po 12 Jan 2021 09:03:16 -0000 1.456
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-12 08:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -342,13 +343,32 @@
"ваÑи даннÑе."
#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
"иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов в
игÑовÑе авÑомаÑÑ Ñ 2010 года. "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.tr.po 11 Jan 2021 09:34:36 -0000 1.105
+++ proprietary.tr.po 12 Jan 2021 09:03:16 -0000 1.106
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-12-17 18:19+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -345,12 +345,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.zh-cn.po 11 Jan 2021 09:34:36 -0000 1.134
+++ proprietary.zh-cn.po 12 Jan 2021 09:03:16 -0000 1.135
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2021-01-08 13:41+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -319,12 +319,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- proprietary.zh-tw-diff.html 11 Jan 2021 09:34:36 -0000 1.209
+++ proprietary.zh-tw-diff.html 12 Jan 2021 09:03:16 -0000 1.210
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -225,12 +225,13 @@
</li>
<li id="M201604040">
- <p>Many popular mobile games are based on the
- gacha system, which has been turning phones into
- slot machines ever since 2010. The “complete
- gacha” variant was declared illegal in Japan in 2012, but <a
+ <p>Many popular mobile games include a random-reward system called
+ <a href="#gacha"><i>gacha</i></a> which is
especially effective on
+ children. One variant of gacha was declared illegal in Japan in 2012,
+ but the other variants are still <a
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/">
- the legal variants are still exploiting users</a>.</p>
+ luring players into compulsively spending</a> inordinate amounts of
+ money on virtual toys.</p>
</li>
<li id="M202101050">
@@ -332,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/11 09:34:36 $
+$Date: 2021/01/12 09:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary.zh-tw.po 11 Jan 2021 09:34:36 -0000 1.217
+++ proprietary.zh-tw.po 12 Jan 2021 09:03:16 -0000 1.218
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-11 09:26+0000\n"
+"POT-Creation-Date: 2021-01-12 08:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -459,12 +459,13 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- pt-br.po 11 Jan 2021 09:34:36 -0000 1.336
+++ pt-br.po 12 Jan 2021 09:03:16 -0000 1.337
@@ -3586,7 +3586,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3621,13 +3621,9 @@
#. type: Content of: <div><p>
#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
+#| msgid "Copyright © 2016-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
#, fuzzy
@@ -3968,12 +3964,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4737,6 +4734,16 @@
"quebrar a restrição). Felizmente, a maioria dos dispositivos Android não
são "
"tiranos."
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -7580,9 +7587,16 @@
msgstr ""
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -7687,9 +7701,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.565
retrieving revision 1.566
diff -u -b -r1.565 -r1.566
--- ru.po 11 Jan 2021 15:02:50 -0000 1.565
+++ ru.po 12 Jan 2021 09:03:16 -0000 1.566
@@ -4329,10 +4329,25 @@
"пÑиводиÑÑ Ð¿Ð¾ÑÑебиÑелей в беÑенÑÑво</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Tesla cars allow the company to extract data remotely and determine the
+# | car's location at any time. (See Section 2, paragraphs b and c of the <a
+# |
[-href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
+# |
{+href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf\">+}
+# | privacy statement</a>.) The company says it doesn't store this
+# | information, but if the state orders it to get the data and hand it over,
+# | the state can store it.
+#, fuzzy
+#| msgid ""
+#| "Tesla cars allow the company to extract data remotely and determine the "
+#| "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#| "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#| "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#| "a>.) The company says it doesn't store this information, but if the state "
+#| "orders it to get the data and hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -4390,7 +4405,10 @@
"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+# | Copyright © 2017-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -4741,13 +4759,32 @@
"a>."
#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+# | Many popular mobile games [-are based on the gacha system,-] {+include a
+# | random-reward system called <a href=\"#gacha\"><i>gacha</i></a>+} which
+# | [-has been turning phones into slot machines ever since 2010. The
+# | “complete gacha”-] {+is especially effective on children.
+# | One+} variant {+of gacha+} was declared illegal in Japan in 2012, but [-<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">-]
+# | the [-legal-] {+other+} variants are still [-exploiting users</a>.-] {+<a
+# |
href=\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/\">
+# | luring players into compulsively spending</a> inordinate amounts of money
+# | on virtual toys.+}
+#, fuzzy
+#| msgid ""
+#| "Many popular mobile games are based on the gacha system, which has been "
+#| "turning phones into slot machines ever since 2010. The “complete "
+#| "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#| "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#| "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#| "variants are still exploiting users</a>."
+msgid ""
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
"Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
"иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов в
игÑовÑе авÑомаÑÑ Ñ 2010 года. "
@@ -5732,6 +5769,10 @@
"Android, коÑоÑÑе ÑвлÑÑÑÑÑ ÑиÑанами</a> (Ñ
оÑÑ
кÑо-Ñо наÑел ÑпоÑоб взломаÑÑ "
"огÑаниÑение)."
+#. type: Content of: <div><p>
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2017-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
msgstr ""
@@ -9270,9 +9311,21 @@
msgstr "ÐгÑÑ"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | [-renewing their subscription.-] {+spending money on the game.+} To
+# | achieve this result, developers use <a
+# |
href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -9373,16 +9426,21 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"“ÐÑÑбокÑÑ” пÑедÑÑавлÑÑÑ Ð¿ÑÑмое
пÑиложение меÑ
анизма ÑлÑÑайного "
"вознагÑаждениÑ, а завиÑимоÑÑÑ Ð¾Ñ Ð½Ð¸Ñ
повÑÑаеÑÑÑ Ð¿Ð¾ÑÑедÑÑвом ÑоблазниÑелÑной "
"мÑлÑÑипликаÑии. ÐÑо <a
href=\"https://www.pcgamer.com/behind-the-addictive-"
-"psychology-and-seductive-art-of-loot-boxes/\"> ÑÑодни азаÑÑнÑм
игÑам</a>, "
-"Ñакже как <a
href=\"https://wikipedia.org/wiki/Gacha_game\">гаÑа-игÑÑ</a>, "
-"оÑÐµÐ½Ñ Ð¿Ð¾Ð¿ÑлÑÑнÑе в Ðзии, коÑоÑÑÑ
можно
ÑÑиÑаÑÑ Ð¿ÑедÑеÑÑвенниками лÑÑбокÑов."
+"psychology-and-seductive-art-of-loot-boxes/\"> ÑÑодни азаÑÑнÑм
игÑам</a>."
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
#. type: Content of: <div><div><ul><li>
msgid ""
@@ -12654,16 +12712,66 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Tesla cars allow the company to extract data remotely and determine the "
+#~ "car's location at any time. (See Section 2, paragraphs b and c of the <a "
+#~ "href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+#~ "tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</"
+#~ "a>.) The company says it doesn't store this information, but if the state "
+#~ "orders it to get the data and hand it over, the state can store it."
+#~ msgstr ""
+#~ "ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а "
+#~ "Ñакже опÑеделÑÑÑ Ð¼ÐµÑÑоположение
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð² лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм. паÑагÑаÑÑ "
+#~ "b и c Ñаздела 2 <a
href=\"http://www.teslamotors.com/sites/default/"
+#~ "files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в "
+#~ "Ñведомлении о конÑиденÑиалÑноÑÑи</a>).
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо она не "
+#~ "Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
Ñведений, но еÑли
гоÑÑдаÑÑÑво пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ Ð¸ "
+#~ "пеÑедаваÑÑ ÑÑи даннÑе, Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ."
+
+#~ msgid ""
+#~ "Many popular mobile games are based on the gacha system, which has been "
+#~ "turning phones into slot machines ever since 2010. The “complete "
+#~ "gacha” variant was declared illegal in Japan in 2012, but <a href="
+#~ "\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-"
+#~ "gaming-still-cant-shake-off-the-spectre-of-exploitation/\"> the legal "
+#~ "variants are still exploiting users</a>."
+#~ msgstr ""
+#~ "Ðногие попÑлÑÑнÑе мобилÑнÑе игÑÑ
оÑÐ½Ð¾Ð²Ð°Ð½Ñ Ð½Ð° ÑиÑÑеме гаÑ, коÑоÑÐ°Ñ "
+#~ "иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ ÑелеÑонов
в игÑовÑе авÑомаÑÑ Ñ 2010 "
+#~ "года. Ð 2012 Ð³Ð¾Ð´Ñ Ð²Ð°ÑÐ¸Ð°Ð½Ñ Ñ “полной
гаÑей” в Японии обÑÑвили "
+#~ "незаконнÑм, но <a href=\"https://www.forbes.com/sites/"
+#~ "olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+#~ "spectre-of-exploitation/\"> законнÑе ваÑианÑÑ Ð²Ñе
Ñавно ÑкÑплÑаÑиÑÑÑÑ "
+#~ "полÑзоваÑелей</a>."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Ðногие игÑÑ Ð¿ÑоекÑиÑÑÑÑÑÑ Ñак, ÑÑобÑ
игÑоки пÑинÑждалиÑÑ Ð¿ÑодолжаÑÑ "
+#~ "игÑÑ — и возобновлÑÑÑ ÑвоÑ
подпиÑкÑ. ЧÑÐ¾Ð±Ñ Ð´Ð¾ÑÑиÑÑ ÑÑого, "
+#~ "ÑазÑабоÑÑики полÑзÑÑÑÑÑ <a
href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
пÑиемами, "
+#~ "вÑÑекаÑÑими из иÑÑледований Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¸
мозга</a>:"
+
+#~ msgid ""
#~ "“Loot boxes” are a direct application of the random reward "
#~ "mechanism, and their addictiveness is enhanced by seductive animation. "
#~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
#~ msgstr ""
#~ "“ÐÑÑбокÑÑ” пÑедÑÑавлÑÑÑ Ð¿ÑÑмое
пÑиложение меÑ
анизма "
#~ "ÑлÑÑайного вознагÑаждениÑ, а
завиÑимоÑÑÑ Ð¾Ñ Ð½Ð¸Ñ
повÑÑаеÑÑÑ Ð¿Ð¾ÑÑедÑÑвом "
#~ "ÑоблазниÑелÑной мÑлÑÑипликаÑии. ÐÑо <a
href=\"https://www.pcgamer.com/"
#~ "behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/\"> "
-#~ "ÑÑодни азаÑÑнÑм игÑам</a>."
+#~ "ÑÑодни азаÑÑнÑм игÑам</a>, Ñакже как <a
href=\"https://wikipedia.org/wiki/"
+#~ "Gacha_game\">гаÑа-игÑÑ</a>, оÑÐµÐ½Ñ Ð¿Ð¾Ð¿ÑлÑÑнÑе в
Ðзии, коÑоÑÑÑ
можно "
+#~ "ÑÑиÑаÑÑ Ð¿ÑедÑеÑÑвенниками лÑÑбокÑов."
#~ msgid ""
#~ "The major social networks are continuously optimizing their design to <a "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- tr.po 11 Jan 2021 09:34:36 -0000 1.119
+++ tr.po 12 Jan 2021 09:03:17 -0000 1.120
@@ -3131,7 +3131,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3167,7 +3167,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3465,12 +3465,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4163,6 +4164,12 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -6660,9 +6667,16 @@
msgstr "Oyunlar"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "renewing their subscription. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -6764,19 +6778,11 @@
"yolları da vardır."
#. type: Content of: <div><div><ul><li>
-#, fuzzy
-#| msgid ""
-#| "“Loot boxes” are a direct application of the random reward "
-#| "mechanism, and their addictiveness is enhanced by seductive animation. "
-#| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgid ""
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
"“YaÄma sandıkları”, rastgele ödül mekanizmasının doÄrudan
bir "
"uygulamasıdır ve baÄımlılık yapıcılıkları baÅtan çıkarıcı
animasyon ile "
@@ -6786,6 +6792,15 @@
#. type: Content of: <div><div><ul><li>
msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
"The developers of gratis mobile games apply the techniques described above "
"to <a href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/"
"\"> turn their products into slot machines</a>. This is clearly described in "
@@ -9533,10 +9548,32 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Birçok oyun; oyuncuların takıntılı bir Åekilde oynamasını
saÄlamak—"
+#~ "ve aboneliklerinin yenilenmesi için tasarlanmıÅtır. Bu sonucu elde
etmek "
+#~ "için geliÅtiriciler, <a href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">davranıÅ
ve "
+#~ "beyin araÅtırmalarından elde edilen yöntemleri</a> kullanırlar:"
+
+#, fuzzy
+#~| msgid ""
+#~| "“Loot boxes” are a direct application of the random reward "
+#~| "mechanism, and their addictiveness is enhanced by seductive animation. "
+#~| "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
+#~| "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ msgid ""
#~ "“Loot boxes” are a direct application of the random reward "
#~ "mechanism, and their addictiveness is enhanced by seductive animation. "
#~ "They are <a href=\"https://www.pcgamer.com/behind-the-addictive-"
-#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+#~ "psychology-and-seductive-art-of-loot-boxes/\"> akin to gambling</a>, and "
+#~ "so are the <a href=\"https://wikipedia.org/wiki/Gacha_game\">gacha games</"
+#~ "a>, very popular in Asia, which may be considered the ancestors of loot "
+#~ "boxes."
#~ msgstr ""
#~ "“YaÄma sandıkları”, rastgele ödül mekanizmasının
doÄrudan bir "
#~ "uygulamasıdır ve baÄımlılık yapıcılıkları baÅtan çıkarıcı
animasyon ile "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- zh-cn.po 11 Jan 2021 09:34:36 -0000 1.121
+++ zh-cn.po 12 Jan 2021 09:03:17 -0000 1.122
@@ -3129,7 +3129,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3167,7 +3167,7 @@
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
#| "Software Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
"Software Foundation, Inc."
@@ -3442,12 +3442,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4117,6 +4118,16 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -6589,7 +6600,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -6666,9 +6677,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- zh-tw.po 11 Jan 2021 09:34:36 -0000 1.266
+++ zh-tw.po 12 Jan 2021 09:03:17 -0000 1.267
@@ -3131,7 +3131,7 @@
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
-"href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"href=\"https://www.tesla.com/sites/default/files/pdfs/en_US/"
"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> privacy statement</a>.) "
"The company says it doesn't store this information, but if the state orders "
"it to get the data and hand it over, the state can store it."
@@ -3165,13 +3165,13 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2020+} Free
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2021+} Free
# | Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -3409,12 +3409,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Many popular mobile games are based on the gacha system, which has been "
-"turning phones into slot machines ever since 2010. The “complete "
-"gacha” variant was declared illegal in Japan in 2012, but <a href="
-"\"https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-"
-"still-cant-shake-off-the-spectre-of-exploitation/\"> the legal variants are "
-"still exploiting users</a>."
+"Many popular mobile games include a random-reward system called <a href="
+"\"#gacha\"><i>gacha</i></a> which is especially effective on children. One "
+"variant of gacha was declared illegal in Japan in 2012, but the other "
+"variants are still <a href=\"https://www.forbes.com/sites/"
+"olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-"
+"spectre-of-exploitation/\"> luring players into compulsively spending</a> "
+"inordinate amounts of money on virtual toys."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -4056,6 +4057,18 @@
"tyrants</a> (though someone found a way to crack the restriction)."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2017-2020+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2017-2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Online Conferencing+} - GNU Project -
# | Free Software Foundation
@@ -6453,7 +6466,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
+"spending money on the game. To achieve this result, developers use <a href="
"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
@@ -6530,9 +6543,16 @@
"“Loot boxes” are a direct application of the random reward "
"mechanism, and their addictiveness is enhanced by seductive animation. They "
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
-"seductive-art-of-loot-boxes/\"> akin to gambling</a>, and so are the <a href="
-"\"https://wikipedia.org/wiki/Gacha_game\">gacha games</a>, very popular in "
-"Asia, which may be considered the ancestors of loot boxes."
+"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li>
+msgid ""
+"<a href=\"https://wikipedia.org/wiki/Gacha_game\"><i>Gacha</i></a> systems, "
+"widely used by Japanese games since 2010, may be considered the ancestors of "
+"loot boxes. A <i>gacha</i> is the virtual equivalent of a capsule-toy "
+"vending machine. Its addictiveness is based on random rewards, and also on "
+"the basic instinct of people to collect items."
msgstr ""
#. type: Content of: <div><div><ul><li>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/08
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/12
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/18