[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/po/de.po proprietary/po/es.po p...
From: |
GNUN |
Subject: |
www proprietary/po/de.po proprietary/po/es.po p... |
Date: |
Tue, 19 Jan 2021 13:32:35 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/01/19 13:32:35
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
thankgnus/po : 2021supporters.pot 2021supporters.pt-br.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.486&r2=1.487
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.435&r2=1.436
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.460&r2=1.461
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.345&r2=1.346
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.584&r2=1.585
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.11&r2=1.12
Patches:
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/de.po 18 Jan 2021 19:31:40 -0000 1.275
+++ proprietary/po/de.po 19 Jan 2021 18:32:23 -0000 1.276
@@ -11817,6 +11817,34 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Please note+} that the article [-uses the
+# | term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+wrongly refers to crackers as \"<a
+# | href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers<
+# | /a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
@@ -14711,18 +14739,6 @@
#, fuzzy
#~| msgid ""
-#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"
-#~ "\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
-#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
-#, fuzzy
-#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary/po/es.po 19 Jan 2021 10:00:33 -0000 1.390
+++ proprietary/po/es.po 19 Jan 2021 18:32:23 -0000 1.391
@@ -12310,6 +12310,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-<small>(Note-]{+<small>(Please note+} that [-this article misuses-] the
+# | [-term <a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>
+# | referring-] {+article wrongly refers+} to [-crackers.)</small>-]
+# | {+crackers as \"<a
+# | href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers<
+# | /a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Hacker\">“hackers”</a> referring to "
+#| "crackers.)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(En ese artÃculo se utiliza erróneamente el término <a href=\"/"
+"philosophy/words-to-avoid.es.html#Hacker\">«<cite>hackers</cite>»</a> para "
+"referirse a los «<cite>crackers</cite>».)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
@@ -15229,20 +15260,6 @@
#, fuzzy
#~| msgid ""
-#~| "<small>(Note that this article misuses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Hacker\">“hackers”</a> referring to "
-#~| "crackers.)</small>"
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"
-#~ "\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>(En ese artÃculo se utiliza erróneamente el término <a href=\"/"
-#~ "philosophy/words-to-avoid.es.html#Hacker\">«<cite>hackers</cite>»</a> "
-#~ "para referirse a los «<cite>crackers</cite>».)</small>"
-
-#, fuzzy
-#~| msgid ""
#~| "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-"
#~| "data-leak-from-baidu-apps-allows-lifetime-user-tracking-according-to-"
#~| "researchers/\">leaked sensitive personal data</a> that can be used for "
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.486
retrieving revision 1.487
diff -u -b -r1.486 -r1.487
--- proprietary/po/fr.po 19 Jan 2021 10:28:41 -0000 1.486
+++ proprietary/po/fr.po 19 Jan 2021 18:32:24 -0000 1.487
@@ -10537,6 +10537,32 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/it.po 18 Jan 2021 19:31:43 -0000 1.275
+++ proprietary/po/it.po 19 Jan 2021 18:32:24 -0000 1.276
@@ -10989,6 +10989,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/ja.po 18 Jan 2021 19:31:44 -0000 1.283
+++ proprietary/po/ja.po 19 Jan 2021 18:32:26 -0000 1.284
@@ -8683,6 +8683,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/nl.po 18 Jan 2021 19:31:47 -0000 1.276
+++ proprietary/po/nl.po 19 Jan 2021 18:32:26 -0000 1.277
@@ -7887,6 +7887,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/pl.po 18 Jan 2021 19:31:47 -0000 1.275
+++ proprietary/po/pl.po 19 Jan 2021 18:32:26 -0000 1.276
@@ -7336,6 +7336,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary/po/pot 18 Jan 2021 19:31:48 -0000 1.274
+++ proprietary/po/pot 19 Jan 2021 18:32:29 -0000 1.275
@@ -6958,6 +6958,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-insecurity.de-diff.html 18 Jan 2021 13:10:32
-0000 1.58
+++ proprietary/po/proprietary-insecurity.de-diff.html 19 Jan 2021 18:32:29
-0000 1.59
@@ -107,19 +107,33 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202012200">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Commercial crackware can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ <p>A cracker</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say">
- get passwords out of an iMonster</a>, use</em></ins></span> the
<span class="removed"><del><strong>owner's contact
list</a>.</p></strong></del></span> <span
class="inserted"><ins><em>microphone and camera,
- and other things.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that</em></ins></span> the <span
class="removed"><del><strong>owner's contact
list</a>.</p></strong></del></span> <span
class="inserted"><ins><em>article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>One</strong></del></span>
- <span class="inserted"><ins><em><li id="M202012190">
+ <span class="inserted"><ins><em><li id="M202012200">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Commercial crackware can <a
+
href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say">
+ get passwords out</em></ins></span> of <span class="inserted"><ins><em>an
iMonster</a>, use</em></ins></span> the <span
class="removed"><del><strong>dangers</strong></del></span> <span
class="inserted"><ins><em>microphone and camera,
+ and other things.</p>
+ </li>
+
+ <li id="M202012190">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -128,74 +142,75 @@
China</a>.</p>
<p>This abuse</em></ins></span> of <span
class="inserted"><ins><em>Zoom's power shows how dangerous that power is. The
- root problem is not</em></ins></span> the <span
class="removed"><del><strong>dangers of</strong></del></span> <span
class="inserted"><ins><em>surveillance and censorship, but
rather</em></ins></span> the <span
class="removed"><del><strong>“internet</strong></del></span>
- <span class="inserted"><ins><em>power that Zoom has. It gets that power
partly from the use</em></ins></span> of <span
class="removed"><del><strong>stings” is that, if
+ root problem is not</em></ins></span> the <span
class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>surveillance and censorship, but rather the
+ power that Zoom has. It gets that power partly from the
use</em></ins></span> of <span class="removed"><del><strong>stings” is
that, if
you lose your internet service, you</strong></del></span> <span
class="inserted"><ins><em>its
server, but</em></ins></span> also <span class="removed"><del><strong><a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection
to</strong></del></span> <span class="inserted"><ins><em>partly
from</em></ins></span> the <span class="removed"><del><strong>real
- internet.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree client program.</p></em></ins></span>
+ lose control</strong></del></span> <span class="inserted"><ins><em>partly
from the nonfree client program.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Amazon recently invited consumers to be suckers
and</strong></del></span>
- <span class="inserted"><ins><em><li id="M202012150">
+ <li id="M202012150">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>United States officials are facing
- one of biggest crackings against them in years, when</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
+ one</em></ins></span> of <span class="removed"><del><strong>your house and
appliances</a>.</p>
+ <p>For your safety, don't use any appliance with</strong></del></span>
<span class="inserted"><ins><em>biggest crackings against them in years, when
<a
+
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
code was sneaked into SolarWinds' proprietary software named
- Orion</a>. Crackers got access</em></ins></span> to <span
class="removed"><del><strong>open their front doors</a>. Wouldn't you
know it,
- the system has</strong></del></span> <span
class="inserted"><ins><em>networks when users downloaded</em></ins></span>
- a <span class="removed"><del><strong>grave security flaw.</p>
-</li>
-<li>
- <p>Intel's intentional “management engine” back door has
<a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
- unintended back doors</a> too.</p>
+ Orion</a>. Crackers got access to networks when users
downloaded</em></ins></span>
+ a <span class="removed"><del><strong>connection</strong></del></span>
<span class="inserted"><ins><em>tainted software update. Crackers were
able</em></ins></span> to <span class="inserted"><ins><em>monitor internal
+ emails at some of</em></ins></span> the <span
class="removed"><del><strong>real
+ internet.</p>
</li>
<li>
- <p>Bad security in some cars makes it possible</strong></del></span>
<span class="inserted"><ins><em>tainted software update. Crackers were
able</em></ins></span> to <span class="removed"><del><strong><a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate</strong></del></span> <span
class="inserted"><ins><em>monitor internal
- emails at some of</em></ins></span> the <span
class="removed"><del><strong>airbags</a>.</p></strong></del></span>
<span class="inserted"><ins><em>top agencies in the US.</p>
+ <p>Amazon recently invited consumers</strong></del></span> <span
class="inserted"><ins><em>top agencies in the US.</p>
<p><small>(Please note that the article
- wrongly refers to crackers as "<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p></em></ins></span>
+ wrongly refers</em></ins></span> to <span
class="inserted"><ins><em>crackers as "<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-<span class="removed"><del><strong><li>
- <p>A “smart” intravenous pump
designed</strong></del></span>
- <span class="inserted"><ins><em><li id="M202012070">
+ <li id="M202012070">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
- caught collecting sensitive personal data</a> that can be
used</em></ins></span> for
- <span class="removed"><del><strong>hospitals</strong></del></span>
- <span class="inserted"><ins><em>lifetime tracking of users, and putting
them in danger. More than 1.4
+ caught collecting sensitive personal data</a> that
can</em></ins></span> be <span
class="removed"><del><strong>suckers</strong></del></span> <span
class="inserted"><ins><em>used for
+ lifetime tracking of users,</em></ins></span> and <span
class="removed"><del><strong><a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff</strong></del></span> <span
class="inserted"><ins><em>putting them in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
- users' privacy</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>jeopardized by this surveillance tool. Data collected
- by Baidu may be handed over</em></ins></span> to the <span
class="removed"><del><strong>internet. Naturally</strong></del></span> <span
class="inserted"><ins><em>Chinese government, possibly
- putting Chinese people in danger.</p>
+ users' privacy is jeopardized by this surveillance tool. Data collected
+ by Baidu may be handed over</em></ins></span> to <span
class="removed"><del><strong>open their front doors</a>. Wouldn't you
know it,</strong></del></span> the <span class="removed"><del><strong>system
has a grave security flaw.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese government, possibly
+ putting Chinese people in danger.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>Intel's intentional “management engine” back
door</strong></del></span>
- <li id="M202011120">
+ <span class="inserted"><ins><em><li id="M202011120">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple has</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></strong></del></span>
+ <p>Apple</em></ins></span> has <a
+<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ unintended back doors</a> too.</p>
+</li>
+<li>
+ <p>Bad security</strong></del></span>
<span
class="inserted"><ins><em>href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
- a malware in</em></ins></span> its <span
class="removed"><del><strong>security has been cracked</a>.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>computers</em></ins></span> that <span
class="inserted"><ins><em>imposes surveillance</a> on users
- and reports users' computing to Apple.</p>
+ a malware</em></ins></span> in <span class="removed"><del><strong>some
cars makes it possible</strong></del></span> <span
class="inserted"><ins><em>its computers that imposes surveillance</a> on
users
+ and reports users' computing</em></ins></span> to <span
class="removed"><del><strong><a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+</li>
+<li>
+ <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>Apple.</p>
- <p>The reports are even unencrypted and they've been
leaking</em></ins></span> this <span class="removed"><del><strong>article
misuses the term</strong></del></span>
- <span class="inserted"><ins><em>data for two years already. This malware
is reporting to Apple what
+ <p>The reports are even unencrypted and they've been leaking this
+ data</em></ins></span> for
+ <span class="removed"><del><strong>hospitals</strong></del></span> <span
class="inserted"><ins><em>two years already. This malware</em></ins></span> is
<span class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>reporting</em></ins></span> to <span
class="removed"><del><strong>the internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its security has been cracked</a>.</p>
+ <p>Note that this article misuses the term</strong></del></span> <span
class="inserted"><ins><em>Apple what
user opens what program at what time. It also gives Apple
power to sabotage users' computing.</p>
</li>
@@ -262,9 +277,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-tethered Amazon Ring had</em></ins></span>
- a <span class="removed"><del><strong>way to break</strong></del></span>
security <span class="removed"><del><strong>on a “smart”
TV</a> and use its camera</strong></del></span> <span
class="inserted"><ins><em>vulnerability that enabled
attackers</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em><a
+ a <span class="removed"><del><strong>way to break</strong></del></span>
security <span class="inserted"><ins><em>vulnerability that enabled attackers
to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span class="removed"><del><strong>people who
are watching TV.</p></strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop on the
household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
@@ -339,7 +354,7 @@
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
+ correct them. This means you can't rely</em></ins></span> on <span
class="inserted"><ins><em>proprietary software
developers to fix bugs in their products.</p>
</li>
@@ -428,7 +443,7 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave security flaw.</p>
+ it, the system has</em></ins></span> a <span
class="inserted"><ins><em>grave security flaw.</p>
</li>
<li id="M201709290">
@@ -442,14 +457,14 @@
<li id="M201709200">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A “smart” intravenous pump
+ <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>TV</a> and use</strong></del></span> <span
class="inserted"><ins><em>intravenous pump
designed for hospitals is connected to the internet. Naturally <a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></em></ins></span>
+ its <span class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em>security has been cracked</a>.</p>
<p><small>(Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.)</small></p>
+ referring</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>crackers.)</small></p>
</li>
<li id="M201708280">
@@ -457,7 +472,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ to snoop on</em></ins></span> the people <span
class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>that use
them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
@@ -1360,7 +1375,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:32 $
+$Date: 2021/01/19 18:32:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary/po/proprietary-insecurity.de.po 15 Jan 2021 20:32:24 -0000
1.160
+++ proprietary/po/proprietary-insecurity.de.po 19 Jan 2021 18:32:29 -0000
1.161
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -165,6 +165,34 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-Note-]{+<small>(Please note+} that [-this article misuses-] the [-term
+# | <a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>
+# | referring-] {+article wrongly refers+} to [-crackers.-] {+crackers as \"<a
+# | href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers<
+# | /a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Note that this article misuses the term <a href=\"/philosophy/words-to-"
+#| "avoid.html#Hacker\">“hackers”</a> referring to crackers."
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"Hinweis: Dieser Artikel missbraucht den Begriff <em><a href=\"/philosophy/"
+"words-to-avoid#Hacker\">âHackerâ</a></em> mit Bezug auf <em>Cracker</em>."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-insecurity.es.po 16 Jan 2021 11:37:49 -0000
1.62
+++ proprietary/po/proprietary-insecurity.es.po 19 Jan 2021 18:32:29 -0000
1.63
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-16 12:34+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -126,6 +127,33 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary/po/proprietary-insecurity.fr.po 16 Jan 2021 10:38:44 -0000
1.228
+++ proprietary/po/proprietary-insecurity.fr.po 19 Jan 2021 18:32:29 -0000
1.229
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-16 11:38+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -125,6 +126,32 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-insecurity.it-diff.html 18 Jan 2021 13:10:32
-0000 1.73
+++ proprietary/po/proprietary-insecurity.it-diff.html 19 Jan 2021 18:32:30
-0000 1.74
@@ -109,13 +109,27 @@
have backdoors</a>.</p>
<p>That is a malicious functionality, but in addition it
is</strong></del></span> a <span class="removed"><del><strong>gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.</p>
+ insecurity since anyone, including malicious crackers,</strong></del></span>
<span class="inserted"><ins><em>trustworthy reference or two
+to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages</em></ins></span>
and <span class="removed"><del><strong>use them</strong></del></span> <span
class="inserted"><ins><em>demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers</em></ins></span> to <span
class="inserted"><ins><em>crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202012200">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -139,9 +153,8 @@
pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>censorship for
China</a>.</p>
- <p>This abuse</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
- keystroke to a file in the filesystem. Any process with access
to</strong></del></span> <span class="inserted"><ins><em>Zoom's power shows how
dangerous that power is. The
- root problem is not</em></ins></span> the <span
class="removed"><del><strong>filesystem or</strong></del></span> <span
class="inserted"><ins><em>surveillance and censorship, but rather the
+ <p>This abuse</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged</strong></del></span> <span
class="inserted"><ins><em>Zoom's power shows how dangerous that power is. The
+ root problem is not</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> <span
class="inserted"><ins><em>surveillance and censorship, but rather the
power that Zoom has. It gets that power partly from the use of its
server, but also partly from the nonfree client program.</p>
</li>
@@ -483,9 +496,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged the user's keystroke
+ pre-installed on 28 models of HP laptops logged the
user's</em></ins></span> keystroke
to a file in the filesystem. Any process with access to the filesystem
- or</em></ins></span> the MapViewOfFile API could gain access to the log.
Furthermore, <a
+ or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
to modzero</a> the “information-leak via Covert Storage Channel
enables malware authors to capture keystrokes without taking the risk
@@ -1316,7 +1329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:32 $
+$Date: 2021/01/19 18:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/proprietary-insecurity.it.po 15 Jan 2021 20:32:24 -0000
1.177
+++ proprietary/po/proprietary-insecurity.it.po 19 Jan 2021 18:32:30 -0000
1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -156,6 +156,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary/po/proprietary-insecurity.ja-diff.html 18 Jan 2021 13:10:32
-0000 1.94
+++ proprietary/po/proprietary-insecurity.ja-diff.html 19 Jan 2021 18:32:30
-0000 1.95
@@ -111,53 +111,72 @@
been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
</li>
-<li>
-<p>A</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+<li></strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202012200">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>A <span class="inserted"><ins><em>cracker</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
+Internet Explorer</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages</em></ins></span>
and <span class="removed"><del><strong>Edge</a> allows an attacker to
retrieve
+Microsoft account credentials, if the user is tricked into
visiting</strong></del></span> <span class="inserted"><ins><em>demanded
+ ransom</a>. The chastity cages are being controlled
by</em></ins></span> a
+<span class="removed"><del><strong>malicious
link.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages are not entirely deleted</a>.
They</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202012200">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Commercial crackware can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer and Edge</a> allows</strong></del></span>
+ <p>Commercial crackware</em></ins></span> can <span
class="removed"><del><strong>be recovered
+in various ways.
+</p>
+</li>
+
+<li>
+<p>A vulnerability in Apple's Image I/O API allowed an attacker
to</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render a
+ certain kind</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say">
- get passwords out of</em></ins></span> an <span
class="removed"><del><strong>attacker to retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>iMonster</a>, use</em></ins></span> the <span
class="removed"><del><strong>user is tricked into visiting a
-malicious link.</p></strong></del></span> <span
class="inserted"><ins><em>microphone and camera,
+ get passwords out</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an iMonster</a>, use the microphone and camera,
and other things.</p></em></ins></span>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>A bug in a proprietary ASN.1</strong></del></span>
<span class="inserted"><ins><em><li id="M202012190">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
A Zoom executive carried out snooping and censorship for
China</a>.</p>
<p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is</em></ins></span> not <span
class="removed"><del><strong>entirely deleted</a>. They can be recovered
-in various ways.
-</p></strong></del></span> <span class="inserted"><ins><em>the
surveillance and censorship, but rather the
+ root problem is not the surveillance and censorship, but rather the
power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client
program.</p></em></ins></span>
+ server, but also partly from the nonfree client program.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A vulnerability</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202012150">
+ <li id="M202012150">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>United States officials are facing
- one of biggest crackings against them</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API allowed
an</strong></del></span> <span class="inserted"><ins><em>years, when <a
+ one of biggest crackings against them in years, when <a
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
code was sneaked into SolarWinds' proprietary software named
Orion</a>. Crackers got access to networks when users downloaded
@@ -663,18 +682,16 @@
<li id="M201607220">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A vulnerability in Apple's Image I/O API allowed
an</em></ins></span> attacker to <a
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- <span class="removed"><del><strong>malacious</strong></del></span>
- <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ malicious code from any application which uses this API to render a
certain kind of image file</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201607190">
+ <li id="M201607190">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>A bug in a proprietary ASN.1 library, used
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A bug in a proprietary ASN.1</em></ins></span> library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
@@ -1250,7 +1267,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:32 $
+$Date: 2021/01/19 18:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary/po/proprietary-insecurity.ja.po 15 Jan 2021 20:32:24 -0000
1.150
+++ proprietary/po/proprietary-insecurity.ja.po 19 Jan 2021 18:32:31 -0000
1.151
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -131,6 +131,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary/po/proprietary-insecurity.pot 15 Jan 2021 20:32:24 -0000
1.116
+++ proprietary/po/proprietary-insecurity.pot 19 Jan 2021 18:32:31 -0000
1.117
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -96,6 +96,21 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a "
+"href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took
"
+"control of people's internet-connected chastity cages and demanded "
+"ransom</a>. The chastity cages are being controlled by a proprietary app "
+"(mobile program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a "
+"href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a "
"href=\"https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say\">
"
"get passwords out of an iMonster</a>, use the microphone and camera, and "
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary/po/proprietary-insecurity.ru.po 15 Jan 2021 21:30:33 -0000
1.273
+++ proprietary/po/proprietary-insecurity.ru.po 19 Jan 2021 18:32:31 -0000
1.274
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-15 20:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -121,6 +122,33 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary/po/proprietary.de-diff.html 18 Jan 2021 13:10:34 -0000
1.221
+++ proprietary/po/proprietary.de-diff.html 19 Jan 2021 18:32:31 -0000
1.222
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,7 +58,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -70,7 +70,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -218,6 +218,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -269,23 +283,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -349,7 +346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:34 $
+$Date: 2021/01/19 18:32:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary/po/proprietary.de.po 12 Jan 2021 15:33:48 -0000 1.257
+++ proprietary/po/proprietary.de.po 19 Jan 2021 18:32:31 -0000 1.258
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -472,6 +472,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Please note+} that the article [-uses the
+# | term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+wrongly refers to crackers as \"<a
+# | href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers<
+# | /a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -519,23 +547,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -638,17 +649,6 @@
#, fuzzy
#~| msgid ""
-#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
-#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
-#, fuzzy
-#~| msgid ""
#~| "The Amazon “smart” TV is <a href=\"http://www.theguardian."
#~| "com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-"
#~| "listening-surveillance\"> snooping all the time</a>."
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary/po/proprietary.es.po 13 Jan 2021 10:18:05 -0000 1.388
+++ proprietary/po/proprietary.es.po 19 Jan 2021 18:32:31 -0000 1.389
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -329,6 +330,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-<small>(Note-]{+<small>(Please note+} that [-this article misuses-] the
+# | [-term <a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>
+# | referring-] {+article wrongly refers+} to [-crackers.)</small>-]
+# | {+crackers as \"<a
+# | href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers<
+# | /a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Hacker\">“hackers”</a> referring to "
+#| "crackers.)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(En ese artÃculo se utiliza erróneamente el término <a href=\"/"
+"philosophy/words-to-avoid.es.html#Hacker\">«<cite>hackers</cite>»</a> para "
+"referirse a los «<cite>crackers</cite>».)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -407,33 +439,6 @@
"usuarios controlar el software. Pero cuando se utiliza software privativo no "
"se tiene el control."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\">tiene una puerta trasera universal</a> que permite a Adobe "
-"controlar el software y, por ejemplo, desactivarlo cuando lo desee. A partir "
-"del 12 de junio de 2021, Adobe bloqueará todo el contenido Flash para "
-"impedir que Flash Player lo ejecute, lo que significa que tienen acceso a "
-"todo Flash Player mediante una puerta trasera."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"Esa puerta trasera no representará ningún peligro en el futuro, ya que "
-"desactivará un programa privativo y hará que los usuarios borren el "
-"software, pero ha sido una injusticia durante muchos años. Los usuarios "
-"deberÃan haber borrado Flash Player antes de que llegara su final."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,3 +518,29 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\">tiene una puerta trasera universal</a> que permite a "
+#~ "Adobe controlar el software y, por ejemplo, desactivarlo cuando lo desee. "
+#~ "A partir del 12 de junio de 2021, Adobe bloqueará todo el contenido Flash
"
+#~ "para impedir que Flash Player lo ejecute, lo que significa que tienen "
+#~ "acceso a todo Flash Player mediante una puerta trasera."
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "Esa puerta trasera no representará ningún peligro en el futuro, ya que "
+#~ "desactivará un programa privativo y hará que los usuarios borren el "
+#~ "software, pero ha sido una injusticia durante muchos años. Los usuarios "
+#~ "deberÃan haber borrado Flash Player antes de que llegara su final."
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.435
retrieving revision 1.436
diff -u -b -r1.435 -r1.436
--- proprietary/po/proprietary.fr.po 12 Jan 2021 17:13:16 -0000 1.435
+++ proprietary/po/proprietary.fr.po 19 Jan 2021 18:32:31 -0000 1.436
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-12 18:11+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -325,6 +326,32 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -405,34 +432,6 @@
"le contrôle aux utilisateurs, mais ce n'est pas le cas avec un logiciel "
"privateur. "
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"Le Flash Player d'Adobe <a href=\"https://www.adobe.com/products/flashplayer/"
-"end-of-life.html\">a une porte dérobée universelle</a> qui permet à cette "
-"société de contrôler le logiciel et, par exemple, de l'inactiver si elle
le "
-"souhaite. Adobe va bloquer la lecture des fichiers Flash par le Flash Player "
-"à partir du 12 janvier 2021, ce qui prouve qu'Adobe a effectivement accès Ã
"
-"chacun des lecteurs Flash par une porte dérobée."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"Cette porte dérobée ne sera plus une menace à l'avenir, puisqu'elle "
-"permettra d'inactiver un programme privateur et poussera ses utilisateurs à "
-"le supprimer, mais elle a constitué une injustice pendant des années. Les "
-"utilisateurs auraient dû se débarrasser du Flash Player bien avant sa fin
de "
-"vie."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,3 +504,31 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "Le Flash Player d'Adobe <a href=\"https://www.adobe.com/products/"
+#~ "flashplayer/end-of-life.html\">a une porte dérobée universelle</a> qui "
+#~ "permet à cette société de contrôler le logiciel et, par exemple, de "
+#~ "l'inactiver si elle le souhaite. Adobe va bloquer la lecture des fichiers "
+#~ "Flash par le Flash Player à partir du 12 janvier 2021, ce qui prouve "
+#~ "qu'Adobe a effectivement accès à chacun des lecteurs Flash par une porte
"
+#~ "dérobée."
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "Cette porte dérobée ne sera plus une menace à l'avenir, puisqu'elle "
+#~ "permettra d'inactiver un programme privateur et poussera ses utilisateurs "
+#~ "à le supprimer, mais elle a constitué une injustice pendant des années.
"
+#~ "Les utilisateurs auraient dû se débarrasser du Flash Player bien avant
sa "
+#~ "fin de vie."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary/po/proprietary.it-diff.html 18 Jan 2021 13:10:35 -0000
1.233
+++ proprietary/po/proprietary.it-diff.html 19 Jan 2021 18:32:31 -0000
1.234
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,9 +58,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -71,8 +70,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -193,10 +193,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -217,6 +217,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -268,23 +282,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -348,7 +345,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:35 $
+$Date: 2021/01/19 18:32:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary.it.po 12 Jan 2021 15:33:48 -0000 1.266
+++ proprietary/po/proprietary.it.po 19 Jan 2021 18:32:31 -0000 1.267
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -477,6 +477,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -524,23 +540,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary/po/proprietary.ja-diff.html 18 Jan 2021 13:10:35 -0000
1.238
+++ proprietary/po/proprietary.ja-diff.html 19 Jan 2021 18:32:31 -0000
1.239
@@ -56,14 +56,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -123,8 +123,7 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -136,7 +135,8 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
+ <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
</ul>
</div>
@@ -222,6 +222,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -273,23 +287,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -353,7 +350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:35 $
+$Date: 2021/01/19 18:32:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary/po/proprietary.ja.po 12 Jan 2021 15:33:48 -0000 1.250
+++ proprietary/po/proprietary.ja.po 19 Jan 2021 18:32:32 -0000 1.251
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -335,6 +335,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -382,23 +398,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/proprietary.nl-diff.html 18 Jan 2021 13:10:35 -0000
1.234
+++ proprietary/po/proprietary.nl-diff.html 19 Jan 2021 18:32:33 -0000
1.235
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,7 +58,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -70,7 +70,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -217,6 +217,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -268,23 +282,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -348,7 +345,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:35 $
+$Date: 2021/01/19 18:32:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/po/proprietary.nl.po 12 Jan 2021 15:33:48 -0000 1.240
+++ proprietary/po/proprietary.nl.po 19 Jan 2021 18:32:33 -0000 1.241
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -380,6 +380,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -427,23 +443,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary/po/proprietary.pl-diff.html 18 Jan 2021 13:10:35 -0000
1.251
+++ proprietary/po/proprietary.pl-diff.html 19 Jan 2021 18:32:33 -0000
1.252
@@ -28,8 +28,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -115,8 +115,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>January, 2021, the pages in this directory
list around 500
-instances of malicious functionalities (with more than 570 references to
+<p>As of January, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 570
references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -167,12 +167,12 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -216,6 +216,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -267,23 +281,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -347,7 +344,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:35 $
+$Date: 2021/01/19 18:32:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary/po/proprietary.pl.po 12 Jan 2021 15:33:48 -0000 1.233
+++ proprietary/po/proprietary.pl.po 19 Jan 2021 18:32:33 -0000 1.234
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -561,6 +561,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -608,23 +624,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary/po/proprietary.pot 12 Jan 2021 15:33:48 -0000 1.230
+++ proprietary/po/proprietary.pot 19 Jan 2021 18:32:33 -0000 1.231
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -271,6 +271,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a "
+"href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took
"
+"control of people's internet-connected chastity cages and demanded "
+"ransom</a>. The chastity cages are being controlled by a proprietary app "
+"(mobile program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a "
+"href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a "
"href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing
"
"its users to hand over sensitive personal data</a> to its parent "
@@ -319,24 +334,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a "
-"href=\"https://www.adobe.com/products/flashplayer/end-of-life.html\"> has a "
-"universal back door</a> which lets Adobe control the software and, for "
-"example, disable it whenever it wants. Adobe will block Flash content from "
-"running in Flash Player beginning January 12, 2021, which indicates that "
-"they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary/po/proprietary.pt-br.po 12 Jan 2021 15:33:48 -0000 1.380
+++ proprietary/po/proprietary.pt-br.po 19 Jan 2021 18:32:33 -0000 1.381
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-05 16:36-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -325,6 +325,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como <a href=\"/philosophy/words-to-avoid.html#Hacker\">âhackersâ</a>.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -386,33 +409,6 @@
"controlar o software. Mas quando você usa um software privativo, você não "
"estará no controle."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"O Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
-"end-of-life.html\"> tem um <em>backdoor</em> universal</a> que permite à "
-"Adobe controlar o software e, por exemplo, desativá-lo sempre que desejar. A
"
-"Adobe bloqueará a execução de conteúdo do Flash no Flash Player a partir
de "
-"12 de janeiro de 2021, o que indica que eles têm acesso a todos os Flash "
-"Player por um <em>backdoor</em>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"O<em>backdoor</em> não será perigoso no futuro, pois desabilitará um "
-"programa privativo e fará com que os usuários excluam o software, mas foi "
-"uma injustiça por muitos anos. Os usuários deveriam ter excluÃdo o Flash "
-"Player antes mesmo de sua vida útil terminar."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,6 +484,32 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "O Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> tem um <em>backdoor</em> universal</a> que permite à "
+#~ "Adobe controlar o software e, por exemplo, desativá-lo sempre que "
+#~ "desejar. A Adobe bloqueará a execução de conteúdo do Flash no Flash "
+#~ "Player a partir de 12 de janeiro de 2021, o que indica que eles têm "
+#~ "acesso a todos os Flash Player por um <em>backdoor</em>."
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "O<em>backdoor</em> não será perigoso no futuro, pois desabilitará um "
+#~ "programa privativo e fará com que os usuários excluam o software, mas
foi "
+#~ "uma injustiça por muitos anos. Os usuários deveriam ter excluÃdo o
Flash "
+#~ "Player antes mesmo de sua vida útil terminar."
+
+#~ msgid ""
#~ "As of 2019-2020, Minecraft players are <a href=\"https://www.minecraft."
#~ "net/en-us/article/java-edition-moving-house\">being forced to move to "
#~ "Microsoft servers</a>, which results in privacy violation. Microsoft "
@@ -547,14 +569,6 @@
#~ "Unidos."
#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</"
-#~ "em> como <a
href=\"/philosophy/words-to-avoid.html#Hacker\">âhackersâ</"
-#~ "a>.)</small>"
-
-#~ msgid ""
#~ "Commercial crackware can <a href=\"https://www.theguardian.com/"
#~ "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
#~ "researchers-say\"> get passwords out of an iMonster</a>, use the "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.460
retrieving revision 1.461
diff -u -b -r1.460 -r1.461
--- proprietary/po/proprietary.ru.po 12 Jan 2021 16:33:57 -0000 1.460
+++ proprietary/po/proprietary.ru.po 19 Jan 2021 18:32:33 -0000 1.461
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -328,6 +329,33 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -407,33 +435,6 @@
"Ñвобода”) пÑогÑамма давала бÑ
полÑзоваÑелÑм конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ Ñобой. Ðо "
"когда полÑзÑеÑÑÑÑ Ð½ÐµÑвободной
пÑогÑаммой, ее никогда не конÑÑолиÑÑеÑÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"Ð Adobe Flash Player еÑÑÑ <a href=\"https://www.adobe.com/products/"
-"flashplayer/end-of-life.html\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>, коÑоÑÑй "
-"позволÑÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ Adobe конÑÑолиÑоваÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸, напÑимеÑ, вÑклÑÑаÑÑ ÐµÐµ, "
-"когда Ñгодно. Adobe бÑÐ´ÐµÑ Ð±Ð»Ð¾ÐºÐ¸ÑоваÑÑ
маÑеÑÐ¸Ð°Ð»Ñ Ð² ÑоÑмаÑе Flash пÑи ÑабоÑе "
-"Flash Player наÑÐ¸Ð½Ð°Ñ Ñ 12 ÑнваÑÑ 2021 года, ÑÑо
показÑваеÑ, ÑÑо Ñ Ð½Ð¸Ñ
еÑÑÑ "
-"доÑÑÑп ко вÑем ÑкземплÑÑам Flash Player ÑеÑез
ÑеÑнÑй Ñ
од."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"ЧеÑнÑй Ñ
од не бÑÐ´ÐµÑ Ð¾Ð¿Ð°Ñен в бÑдÑÑем,
поÑколÑÐºÑ Ð¾Ð½ оÑклÑÑÐ¸Ñ Ð½ÐµÑвободнÑÑ "
-"пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ вÑнÑÐ´Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей
ÑдалиÑÑ ÐµÐµ, но он бÑл неÑпÑаведливоÑÑÑÑ "
-"долгие годÑ. ÐолÑзоваÑелÑм Ñледовало
ÑдалиÑÑ Flash Player еÑе до оконÑÐ°Ð½Ð¸Ñ "
-"его жизненного Ñикла."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -510,6 +511,32 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "Ð Adobe Flash Player еÑÑÑ <a href=\"https://www.adobe.com/products/"
+#~ "flashplayer/end-of-life.html\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>, коÑоÑÑй "
+#~ "позволÑÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ Adobe конÑÑолиÑоваÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸, напÑимеÑ, вÑклÑÑаÑÑ "
+#~ "ее, когда Ñгодно. Adobe бÑÐ´ÐµÑ Ð±Ð»Ð¾ÐºÐ¸ÑоваÑÑ
маÑеÑÐ¸Ð°Ð»Ñ Ð² ÑоÑмаÑе Flash пÑи "
+#~ "ÑабоÑе Flash Player наÑÐ¸Ð½Ð°Ñ Ñ 12 ÑнваÑÑ 2021 года,
ÑÑо показÑваеÑ, ÑÑо Ñ "
+#~ "ниÑ
еÑÑÑ Ð´Ð¾ÑÑÑп ко вÑем ÑкземплÑÑам Flash
Player ÑеÑез ÑеÑнÑй Ñ
од."
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "ЧеÑнÑй Ñ
од не бÑÐ´ÐµÑ Ð¾Ð¿Ð°Ñен в бÑдÑÑем,
поÑколÑÐºÑ Ð¾Ð½ оÑклÑÑÐ¸Ñ Ð½ÐµÑвободнÑÑ "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ вÑнÑÐ´Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей
ÑдалиÑÑ ÐµÐµ, но он бÑл неÑпÑаведливоÑÑÑÑ "
+#~ "долгие годÑ. ÐолÑзоваÑелÑм Ñледовало
ÑдалиÑÑ Flash Player еÑе до "
+#~ "оконÑÐ°Ð½Ð¸Ñ ÐµÐ³Ð¾ жизненного Ñикла."
+
+#~ msgid ""
#~ "As of 2019-2020, Minecraft players are <a href=\"https://www.minecraft."
#~ "net/en-us/article/java-edition-moving-house\">being forced to move to "
#~ "Microsoft servers</a>, which results in privacy violation. Microsoft "
@@ -566,14 +593,6 @@
#~ "СШÐ."
#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>(ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-"
-#~ "avoid.html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
-#~ "обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.)</small>"
-
-#~ msgid ""
#~ "Commercial crackware can <a href=\"https://www.theguardian.com/"
#~ "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
#~ "researchers-say\"> get passwords out of an iMonster</a>, use the "
Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary.tr.po 15 Jan 2021 20:07:09 -0000 1.110
+++ proprietary/po/proprietary.tr.po 19 Jan 2021 18:32:33 -0000 1.111
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-15 20:58+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -324,6 +325,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the word “<a href=\"/"
+#| "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#| "crackers.”)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Bu yazının “<a href=\"/philosophy/words-to-avoid.html#Hacker"
+"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
+"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -401,33 +426,6 @@
"denetlemesine izin verecektir. Ãzel mülk bir yazılım kullandıÄınızda
denetim "
"sizde olmaz."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"Adobe Flash Oynatıcı <a href=\"https://www.adobe.com/products/flashplayer/"
-"end-of-life.html\"> evrensel bir arka kapıya sahip</a>, bu arka kapı "
-"Adobe'nin yazılımı denetlemesini, örneÄin istediÄi zaman onu etkisiz "
-"kılmasını saÄlar. Adobe 12 Ocak 2021'den itibaren Flask içeriklerinin
Flash "
-"Oynatıcıda çalıÅmasını engelleyecek, bu da her Flash Oynatıcıya bir
arka "
-"kapı aracılıÄıyla eriÅimi var demektir."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"Arka kapı gelecekte tehlike yaratmayacak, çünkü özel mülk programı
etkisiz "
-"kılacak ve kullanıcının yazılımı kaldırmasına yol açacak, her Åeye
raÄmen "
-"bir çok yıl için bir adaletsizlikti. Kullanıcılar Flash Oynatıcıyı
ömrünü "
-"tamamlamadan önce kaldırmalıydı."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -509,6 +507,32 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "Adobe Flash Oynatıcı <a
href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> evrensel bir arka kapıya sahip</a>, bu arka kapı "
+#~ "Adobe'nin yazılımı denetlemesini, örneÄin istediÄi zaman onu etkisiz
"
+#~ "kılmasını saÄlar. Adobe 12 Ocak 2021'den itibaren Flask içeriklerinin
"
+#~ "Flash Oynatıcıda çalıÅmasını engelleyecek, bu da her Flash
Oynatıcıya bir "
+#~ "arka kapı aracılıÄıyla eriÅimi var demektir."
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "Arka kapı gelecekte tehlike yaratmayacak, çünkü özel mülk programı "
+#~ "etkisiz kılacak ve kullanıcının yazılımı kaldırmasına yol
açacak, her "
+#~ "Åeye raÄmen bir çok yıl için bir adaletsizlikti. Kullanıcılar Flash
"
+#~ "Oynatıcıyı ömrünü tamamlamadan önce kaldırmalıydı."
+
+#~ msgid ""
#~ "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-"
#~ "data-leak-from-baidu-apps-allows-lifetime-user-tracking-according-to-"
#~ "researchers/\">leaked sensitive personal data</a> that can be used for "
@@ -733,15 +757,6 @@
#~ "gelen ve giden mesajları ele geçirebilirler."
#~ msgid ""
-#~ "<small>(Note that this article misuses the word “<a href=\"/"
-#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
-#~ "crackers.”)</small>"
-#~ msgstr ""
-#~ "<small>(Bu yazının “<a
href=\"/philosophy/words-to-avoid.html#Hacker"
-#~ "\">üstât (hacker)</a>” kelimesini “güvenlik
kırıcı” "
-#~ "anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
-
-#~ msgid ""
#~ "Roblox (among many other games) created anti-features which sucker "
#~ "children into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-"
#~ "kids-spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-"
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary/po/proprietary.zh-cn.po 14 Jan 2021 10:00:00 -0000 1.139
+++ proprietary/po/proprietary.zh-cn.po 19 Jan 2021 18:32:33 -0000 1.140
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-14 17:26+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -304,6 +305,28 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -374,29 +397,6 @@
"</a>ï¼è¿ä¸ªæ¿ç对ç¨æ·æ¯ä¸å
¬æ£çãèªç±è½¯ä»¶æ¯ç¨æ·æ§å¶è½¯ä»¶ãä½æ¯å¦æä½ ä½¿ç¨ä¸æ软"
"件ï¼é£ä¹ä½ æ æ³æ§å¶ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\">æä¸ä¸ªå
¨å±åé¨</a>ï¼å®è®© Adobe
è½å¤æ§å¶è¯¥è½¯ä»¶ãæ¯å¦ï¼éæ¶ç¦ç¨"
-"该软件ãAdobe å°å¨ 2021 å¹´ 1 æ 12 æ¥ç¦æ¢ Flash Player è¿è¡
Flash å
容ï¼è¿è¡¨"
-"æä»ä»¬æ访é®ææ Flash Player 软件çåé¨ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-"è¿ä¸ªåé¨ä¹è®¸å¨å°æ¥æ²¡æä»ä¹å±é©ï¼å
为ç¦ç¨è¯¥ä¸æ软件ä¹åï¼èç¨æ·ä¼æ该软件å "
-"é¤ï¼ä½æ¯è¿ç§ä¸å
¬æ£å·²ç»åå¨å¤å¹´ãç¨æ·åºè¯¥å¨ Flash Player
寿ç»æ£å¯åå°±å é¤å®ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +481,29 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\"> has a universal back door</a> which lets Adobe "
+#~ "control the software and, for example, disable it whenever it wants. "
+#~ "Adobe will block Flash content from running in Flash Player beginning "
+#~ "January 12, 2021, which indicates that they have access to every Flash "
+#~ "Player through a back door."
+#~ msgstr ""
+#~ "Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/"
+#~ "end-of-life.html\">æä¸ä¸ªå
¨å±åé¨</a>ï¼å®è®© Adobe
è½å¤æ§å¶è¯¥è½¯ä»¶ãæ¯å¦ï¼é"
+#~ "æ¶ç¦ç¨è¯¥è½¯ä»¶ãAdobe å°å¨ 2021 å¹´ 1 æ 12 æ¥ç¦æ¢ Flash Player
è¿è¡ Flash å
"
+#~ "容ï¼è¿è¡¨æä»ä»¬æ访é®ææ Flash Player 软件çåé¨ã"
+
+#~ msgid ""
+#~ "The back door won't be dangerous in the future, as it'll disable a "
+#~ "proprietary program and make users delete the software, but it was an "
+#~ "injustice for many years. Users should have deleted Flash Player even "
+#~ "before its end of life."
+#~ msgstr ""
+#~ "è¿ä¸ªåé¨ä¹è®¸å¨å°æ¥æ²¡æä»ä¹å±é©ï¼å
为ç¦ç¨è¯¥ä¸æ软件ä¹åï¼èç¨æ·ä¼æ该软件å "
+#~ "é¤ï¼ä½æ¯è¿ç§ä¸å
¬æ£å·²ç»åå¨å¤å¹´ãç¨æ·åºè¯¥å¨ Flash
Player 寿ç»æ£å¯åå°±å é¤"
+#~ "å®ã"
+
+#~ msgid ""
#~ "As of 2019-2020, Minecraft players are <a href=\"https://www.minecraft."
#~ "net/en-us/article/java-edition-moving-house\">being forced to move to "
#~ "Microsoft servers</a>, which results in privacy violation. Microsoft "
@@ -530,13 +553,6 @@
#~ "å¯ä»¥çæ§ç¾å½æäºé«å±æºæçå
é¨çµåé®ä»¶ã"
#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
-
-#~ msgid ""
#~ "Commercial crackware can <a href=\"https://www.theguardian.com/"
#~ "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
#~ "researchers-say\"> get passwords out of an iMonster</a>, use the "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary/po/proprietary.zh-tw-diff.html 18 Jan 2021 13:10:35 -0000
1.214
+++ proprietary/po/proprietary.zh-tw-diff.html 19 Jan 2021 18:32:33 -0000
1.215
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,7 +58,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -70,7 +70,7 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+ .reduced-width { width: 55em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -218,6 +218,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101110">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A cracker <a
+
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
+ control of people's internet-connected chastity cages and demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
+ app (mobile program).</p>
+
+ <p><small>(Please note that the article
+ wrongly refers to crackers as "<a
+
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+ </li>
+
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -269,23 +283,6 @@
control the software. But when you use a proprietary software,
you won't be in control.</p>
</li>
-
- <li id="M202012020">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Adobe Flash Player <a
- href="https://www.adobe.com/products/flashplayer/end-of-life.html">
- has a universal back door</a> which lets Adobe control
- the software and, for example, disable it whenever it
- wants. Adobe will block Flash content from running in Flash Player
- beginning January 12, 2021, which indicates that they have access to
- every Flash Player through a back door.</p>
-
- <p>The back door won't be dangerous in the future, as it'll disable
- a proprietary program and make users delete the software, but it
- was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -349,7 +346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/18 13:10:35 $
+$Date: 2021/01/19 18:32:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary/po/proprietary.zh-tw.po 12 Jan 2021 15:33:49 -0000 1.220
+++ proprietary/po/proprietary.zh-tw.po 19 Jan 2021 18:32:34 -0000 1.221
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-01-12 15:26+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -450,6 +450,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
@@ -497,23 +513,6 @@
"control."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Adobe Flash Player <a href=\"https://www.adobe.com/products/flashplayer/end-"
-"of-life.html\"> has a universal back door</a> which lets Adobe control the "
-"software and, for example, disable it whenever it wants. Adobe will block "
-"Flash content from running in Flash Player beginning January 12, 2021, which "
-"indicates that they have access to every Flash Player through a back door."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The back door won't be dangerous in the future, as it'll disable a "
-"proprietary program and make users delete the software, but it was an "
-"injustice for many years. Users should have deleted Flash Player even before "
-"its end of life."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.345
retrieving revision 1.346
diff -u -b -r1.345 -r1.346
--- proprietary/po/pt-br.po 18 Jan 2021 19:31:48 -0000 1.345
+++ proprietary/po/pt-br.po 19 Jan 2021 18:32:34 -0000 1.346
@@ -8660,6 +8660,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
+"sentido de âgrátisâ.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
@@ -10746,18 +10768,6 @@
#, fuzzy
#~| msgid ""
-#~| "<small>Note: this article uses the word “free” in the sense "
-#~| "of “gratis.”</small>"
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"
-#~ "\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â
no "
-#~ "sentido de âgrátisâ.</small>"
-
-#, fuzzy
-#~| msgid ""
#~| "As of July, 2020, the pages in this directory list around 450 instances "
#~| "of malicious functionalities (with more than 520 references to back them "
#~| "up), but there are surely thousands more we don't know about."
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.584
retrieving revision 1.585
diff -u -b -r1.584 -r1.585
--- proprietary/po/ru.po 19 Jan 2021 10:13:41 -0000 1.584
+++ proprietary/po/ru.po 19 Jan 2021 18:32:34 -0000 1.585
@@ -10474,6 +10474,33 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Please note that the article wrongly refers to crackers as \"<a
+# | [-href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hacker
+# | s</a>\".)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/po/tr.po 18 Jan 2021 19:31:49 -0000 1.128
+++ proprietary/po/tr.po 19 Jan 2021 18:32:34 -0000 1.129
@@ -7688,6 +7688,30 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the word “<a href=\"/"
+#| "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#| "crackers.”)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>(Bu yazının “<a href=\"/philosophy/words-to-avoid.html#Hacker"
+"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
+"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
@@ -9717,20 +9741,6 @@
#, fuzzy
#~| msgid ""
-#~| "<small>(Note that this article misuses the word “<a href=\"/"
-#~| "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean "
-#~| "“crackers.”)</small>"
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"
-#~ "\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>(Bu yazının “<a
href=\"/philosophy/words-to-avoid.html#Hacker"
-#~ "\">üstât (hacker)</a>” kelimesini “güvenlik
kırıcı” "
-#~ "anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
-
-#, fuzzy
-#~| msgid ""
#~| "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-"
#~| "data-leak-from-baidu-apps-allows-lifetime-user-tracking-according-to-"
#~| "researchers/\">leaked sensitive personal data</a> that can be used for "
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/zh-cn.po 18 Jan 2021 19:31:49 -0000 1.131
+++ proprietary/po/zh-cn.po 19 Jan 2021 18:32:34 -0000 1.132
@@ -7460,6 +7460,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the word “<a href=\"/"
+#| "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#| "crackers.”)</small>"
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
@@ -9486,19 +9509,6 @@
#, fuzzy
#~| msgid ""
-#~| "<small>(Note that this article misuses the word “<a href=\"/"
-#~| "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean "
-#~| "“crackers.”)</small>"
-#~ msgid ""
-#~ "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#~ "href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"
-#~ "\">hackers</a>\".)</small>"
-#~ msgstr ""
-#~ "<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
-
-#, fuzzy
-#~| msgid ""
#~| "Baidu apps <a href=\"https://www.cpomagazine.com/data-privacy/sensitive-"
#~| "data-leak-from-baidu-apps-allows-lifetime-user-tracking-according-to-"
#~| "researchers/\">leaked sensitive personal data</a> that can be used for "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/zh-tw.po 18 Jan 2021 19:31:49 -0000 1.275
+++ proprietary/po/zh-tw.po 19 Jan 2021 18:32:34 -0000 1.276
@@ -7334,6 +7334,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A cracker <a href=\"https://www.vice.com/en/article/m7apnn/your-cock-is-mine-"
+"now-hacker-locks-internet-connected-chastity-cage-demands-ransom\">took "
+"control of people's internet-connected chastity cages and demanded ransom</"
+"a>. The chastity cages are being controlled by a proprietary app (mobile "
+"program)."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Please note that the article wrongly refers to crackers as \"<a href="
+"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)"
+"</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"United States officials are facing one of biggest crackings against them in "
"years, when <a href=\"https://www.theguardian.com/technology/2020/dec/15/"
"orion-hack-solar-winds-explained-us-treasury-commerce-department\">malicious "
Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- thankgnus/po/2021supporters.pot 17 Jan 2021 21:29:26 -0000 1.6
+++ thankgnus/po/2021supporters.pot 19 Jan 2021 18:32:34 -0000 1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-01-17 21:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -115,9 +115,17 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "Guus Sliepen"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Martin Jässing"
msgstr ""
+#. type: Content of: <ul><li>
+msgid "Paul Allen"
+msgstr ""
+
#. type: Content of: <h4>
msgid "<a href=\"#TOCother\" id=\"other\">Other</a>"
msgstr ""
Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- thankgnus/po/2021supporters.pt-br.po 18 Jan 2021 16:01:07 -0000
1.11
+++ thankgnus/po/2021supporters.pt-br.po 19 Jan 2021 18:32:34 -0000
1.12
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-01-17 21:25+0000\n"
+"POT-Creation-Date: 2021-01-19 18:25+0000\n"
"PO-Revision-Date: 2021-01-18 12:38-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-19 18:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 3.38.0\n"
@@ -133,9 +134,17 @@
msgstr "Conan Chiles"
#. type: Content of: <ul><li>
+msgid "Guus Sliepen"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Martin Jässing"
msgstr "Martin Jässing"
+#. type: Content of: <ul><li>
+msgid "Paul Allen"
+msgstr ""
+
#. type: Content of: <h4>
msgid "<a href=\"#TOCother\" id=\"other\">Other</a>"
msgstr "<a href=\"#TOCother\" id=\"other\">Outros</a>"