www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy/po surveillance-vs-democracy.es....


From: GNUN
Subject: www/philosophy/po surveillance-vs-democracy.es....
Date: Sat, 3 Jul 2021 04:01:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/03 04:01:32

Modified files:
        philosophy/po  : surveillance-vs-democracy.es.po 
                         surveillance-vs-democracy.fr.po 
                         surveillance-vs-democracy.it.po 
                         surveillance-vs-democracy.ja.po 
                         surveillance-vs-democracy.lt-diff.html 
                         surveillance-vs-democracy.lt.po 
                         surveillance-vs-democracy.ml.po 
                         surveillance-vs-democracy.nl.po 
                         surveillance-vs-democracy.pot 
                         surveillance-vs-democracy.pt-br.po 
                         surveillance-vs-democracy.ru.po 
                         surveillance-vs-democracy.sq.po 
                         surveillance-vs-democracy.tr.po 
                         surveillance-vs-democracy.uk-diff.html 
                         surveillance-vs-democracy.uk.po 
                         surveillance-vs-democracy.zh-cn.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.61&r2=1.62

Patches:
Index: surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- surveillance-vs-democracy.es.po     3 Jul 2021 07:55:45 -0000       1.116
+++ surveillance-vs-democracy.es.po     3 Jul 2021 08:01:32 -0000       1.117
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2020-12-18 10:53+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -32,7 +33,10 @@
 msgstr "¿Cuánta vigilancia puede soportar la democracia?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "por <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -129,6 +133,32 @@
 "que no corren peligro."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -136,10 +166,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -159,8 +189,24 @@
 "privacidad una vez que pongamos los pies en Internet</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -194,19 +240,48 @@
 "vigilancia que la democracia no puede soportar."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Un funcionario no identificado del gobierno de los EE.&nbsp;UU. en 2011 hizo "
 "a los periodistas la inquietante declaración de que <a href=\"http://www.";
@@ -225,10 +300,27 @@
 "verizon-2013-06-07\">otras empresas</a>."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -250,12 +342,34 @@
 "Una vez que se haya obtenido la información, será usada incorrectamente"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -291,9 +405,50 @@
 "creer si así lo deseamos."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -306,7 +461,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -334,6 +489,31 @@
 "a>."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -341,7 +521,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -376,9 +556,17 @@
 "shtml\">informáticos al servicio de países enemigos</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Los gobiernos pueden fácilmente utilizar la capacidad de vigilancia masiva "
@@ -421,10 +609,18 @@
 "se adopten completamente y se apliquen sin excepción para siempre."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "No obstante, tales protecciones legales son precarias: como lo demuestra la "
 "historia reciente, pueden ser revocadas (como en el caso de la Ley de "
@@ -518,8 +714,29 @@
 "enviar todos los datos pertinentes a la empresa que gestoina el servidor."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -714,20 +931,49 @@
 "a los datos recolectados por las empresas."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "A través del programa PRISM, la NSA <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">ha accedido a las bases de datos de muchas grandes "
@@ -782,15 +1028,38 @@
 "para violar la privacidad que compromisos para defenderla."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -806,10 +1075,20 @@
 "adecuados y que el Estado no los obstruya."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Otro método posible para efectuar pagos anónimos es el uso de <a href="
 "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
@@ -968,18 +1247,42 @@
 msgstr "Remedio para los expedientes de comunicaciones"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Los proveedores del servicio de Internet <abbr title=\"Internet Service "
 "Provider\">ISP</abbr> y las compañías telefónicas conservan mucha "
@@ -1009,10 +1312,32 @@
 "vigilar a una cierta persona."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1082,6 +1407,30 @@
 "priori</i>."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1091,7 +1440,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1110,12 +1459,33 @@
 "está a favor de esto."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1223,7 +1593,6 @@
 "proponer otras correcciones o sugerencias, diríjase a <a href=\"mailto:";
 "webmasters@gnu.org\">&lt;webmasters@gnu.org&gt;</a>."
 
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -1231,14 +1600,14 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "El equipo de traductores al español se esfuerza por ofrecer traducciones "
@@ -1250,8 +1619,10 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1274,8 +1645,6 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- surveillance-vs-democracy.fr.po     3 Jul 2021 07:55:45 -0000       1.134
+++ surveillance-vs-democracy.fr.po     3 Jul 2021 08:01:32 -0000       1.135
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2020-12-18 19:03+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -31,7 +32,10 @@
 msgstr "Quel niveau de surveillance la démocratie peut-elle endurer ?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "par <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -129,6 +133,32 @@
 "d'alerte se sentent en sécurité."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -136,10 +166,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -158,8 +188,24 @@
 "où nous mettons les pieds sur Internet</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -194,19 +240,48 @@
 "delà de ce que peut supporter la démocratie."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "En 2011, un représentant anonyme du gouvernement américain a fait une "
 "déclaration inquiétante à des journalistes, à savoir que <a 
href=\"http://";
@@ -224,10 +299,27 @@
 "les relevés téléphoniques de chaque résident."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -248,12 +340,34 @@
 msgstr "L'information, une fois collectée, sera utilisée à de mauvaises 
fins"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -291,9 +405,50 @@
 "un conte de fées que nous pouvons croire si cela nous chante."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -306,7 +461,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -334,6 +489,31 @@
 "cas aux États-Unis</a>."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -341,7 +521,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -376,9 +556,17 @@
 "revealed-even-worse-than-first.shtml\">au service d'États hostiles</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Les gouvernements peuvent facilement faire usage de leur énorme capacité de 
"
@@ -422,10 +610,18 @@
 "exception, à tout jamais."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Toutefois, ces protections juridiques sont précaires : comme nous l'ont "
 "montré les récents événements, ils peuvent être abrogés (comme dans la 
loi "
@@ -520,8 +716,29 @@
 "fournir toutes les données pertinentes au serveur de l'entreprise."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -717,20 +934,49 @@
 "de l'État."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "Depuis PRISM, <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">la NSA a un accès direct aux bases de données de "
@@ -787,15 +1033,38 @@
 "violer celle-ci qu'un engagement à la respecter."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -812,10 +1081,20 @@
 "commerciaux adaptés et que l'État n'y fasse pas obstruction."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Une autre méthode possible de paiement anonyme fait usage de <a href="
 "\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>cartes "
@@ -973,18 +1252,42 @@
 msgstr "Remède aux dossiers sur les communications"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Les fournisseurs de services Internet et les compagnies de téléphone "
 "enregistrent une masse de données sur les contacts de leurs utilisateurs "
@@ -1015,10 +1318,32 @@
 "personne ou un groupe en particulier."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1087,6 +1412,30 @@
 "numériques d'accumuler d'énormes dossiers avant les faits."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1096,7 +1445,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1117,12 +1466,33 @@
 "près de 60 %</a>. L'ACLU y est favorable."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1260,14 +1630,14 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Merci d'adresser vos commentaires sur les pages en français à &lt;<a href="
@@ -1278,8 +1648,10 @@
 "traduction</a> les infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1306,8 +1678,6 @@
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- surveillance-vs-democracy.it.po     3 Jul 2021 07:55:45 -0000       1.128
+++ surveillance-vs-democracy.it.po     3 Jul 2021 08:01:32 -0000       1.129
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2021-02-01 07:00-0500\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Italian\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "X-Generator: Poedit 2.2\n"
 
 #. type: Content of: <title>
@@ -33,7 +34,10 @@
 
 # type: Content of: <p>
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "di <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -126,6 +130,32 @@
 "scoperti."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -133,10 +163,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -154,8 +184,24 @@
 "quando mettiamo piede su Internet</a>. "
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -188,19 +234,48 @@
 "ammissibile in democrazia."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Nel 2011 un anonimo funzionario statale americano ammonì i giornalisti che "
 "<a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-";
@@ -217,10 +292,27 @@
 "a>."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -239,12 +331,34 @@
 msgstr "Una volta raccolte, le informazioni saranno usate in modi impropri"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -277,9 +391,50 @@
 "rispettate, sono più simili a una favola a cui possiamo credere se vogliamo."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -292,7 +447,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -319,6 +474,31 @@
 "Stati Uniti."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -326,7 +506,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -358,9 +538,17 @@
 "revealed-even-worse-than-first.shtml\">lavorano per potenze nemiche</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "I governi possono facilmente usare la sorveglianza di massa per <a href="
@@ -401,10 +589,18 @@
 "fatti rispettare senza eccezioni per sempre."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Tuttavia queste garanzie legali sono precarie: come dimostra la storia "
 "recente, esse possono venir abrogate (come nel caso del FISA Amendment Act), "
@@ -496,8 +692,29 @@
 "esterna tutti i relativi dati."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -685,20 +902,49 @@
 "disposizione dello stato."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "Grazie a PRISM, la NSA <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">si è introdotta nei database</a> di molte grandi "
@@ -750,15 +996,38 @@
 "un impegno a rispettarla."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -774,10 +1043,20 @@
 "dei modelli di business adatti, che non vengano intralciati dallo stato."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Un altro modo possibile di effettuare pagamenti anonimi sarebbe con <a href="
 "\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>schede "
@@ -929,18 +1208,42 @@
 msgstr "Un rimedio ai dossier sulle comunicazioni"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "I fornitori di servizi Internet e le compagnie telefoniche conservano grandi "
 "quantità di dati sui contatti dei loro utenti (cronologia di navigazione, "
@@ -969,10 +1272,32 @@
 "mandato del tribunale a sorvegliare un dato soggetto."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1038,6 +1363,30 @@
 "digitali accumulino immensi dossier prima del fatto."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1047,7 +1396,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1066,12 +1415,33 @@
 "provvedimento."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1183,14 +1553,14 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Le traduzioni italiane sono effettuate ponendo la massima attenzione ai "
@@ -1204,8 +1574,10 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1229,8 +1601,6 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- surveillance-vs-democracy.ja.po     3 Jul 2021 07:55:45 -0000       1.78
+++ surveillance-vs-democracy.ja.po     3 Jul 2021 08:01:32 -0000       1.79
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2021-04-05 16:46+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -29,7 +30,9 @@
 msgstr "民主主義はどれくらい監視に耐え得るか?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a 
href=\"http://www.stallman.org/\";>リチャード・ストールマン</a>著"
 
 #. type: Content of: <blockquote><p><em>
@@ -117,6 +120,20 @@
 "安全だ
とわかる点まで監視を削減しなければなりません。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -124,10 +141,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -146,8 +163,17 @@
 
"け)ではわたしたちのプライバシーを守れないでしょう</a>。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -179,19 +205,34 @@
 "です。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "匿名の合衆国政府のå…
¬å‹™å“¡ã¯ä¸æ°—味に2011年、ジャーナリストにこう言いました。<a
 "
 "href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-";
@@ -207,10 +248,19 @@
 
"ていることを、スノーデンはわたしたちに示したのです。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -229,12 +279,24 @@
 msgstr "情報は一度集積されれば悪用される"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -266,9 +328,30 @@
 "れるおとぎ話のようなものです。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -281,7 +364,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -305,6 +388,20 @@
 
"com/699236946e3140659fff8a2362e16f43\">合衆国の多くの事例</a>があります。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -312,7 +409,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -343,9 +440,14 @@
 
"shtml\">敵対的な国のために働いているクラッカー</a>かも知れません。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "政府は容易に大量監視の機構を使って<a 
href=\"http://www.nytimes.";
@@ -383,10 +485,15 @@
 "しょう。もし、完全に採択され、例外なしに永久
に実施されるのであれば。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "しかし、こういった法的な保護はあてになりません: 
最近の歴史はそれらは廃止(外国"
 "諜å 
±æ´»å‹•èª¿æŸ»æ³•ä¿®æ­£æ³•ã«è¦‹ã‚‰ã‚Œã‚‹ã‚ˆã†ã«)、停止、あるいは<a 
href=\"http://www.";
@@ -473,8 +580,20 @@
 "れは要求するのです。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -649,20 +768,35 @@
 "用可能だからです。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "PRISMを通じて、NSAは<a href=\"https://www.commondreams.org/";
 
"headline/2013/08/23-2\">たくさんの大きなインターネット企業のデータベースに乗"
@@ -712,15 +846,27 @@
 "ちはよく知っています。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -735,10 +881,16 @@
 "取り決めが必要なだ
けで、国家はそれを妨害しなければいいのです。"
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "匿名の支払いのもう一つのありうるやり方は、<a 
href=\"https://stallman.org/";
 
"articles/anonymous-payments-thru-phones.html\">電話のプリペイドカード</a>を使"
@@ -882,18 +1034,31 @@
 msgstr "通信の記録の対策"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 
"インターネットサービスプロバイダと電話会社はユーザとの契約で大量のデータ(ブラ"
 
"ウズ、電話会話、そのほか)を保管しています。携帯電話では、<a
 href=\"http://";
@@ -919,10 +1084,22 @@
 "べきではありません。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -984,6 +1161,20 @@
 "ステムを禁止すれば。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -993,7 +1184,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1010,12 +1201,23 @@
 "はこれを好ましく考えています。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1121,25 +1323,27 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 
"正確で良い品質の翻訳を提供するよう努力していますが、不完å
…¨ãªå ´åˆã‚‚あるかと思"
 "います。翻訳に関するコメントと提案は、<a 
href=\"mailto:web-translators@gnu.";
 
"org\">&lt;web-translators@gnu.org&gt;</a>におねがいします。</p><p>わたしたち"
-"のウェブページの翻訳の調整と提出については、<a 
href=\"/server/standards/"
+"のウェブページの翻訳の調整と貢献については、<a 
href=\"/server/standards/"
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1161,11 +1365,9 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 
 #~ msgid ""
 #~ "A version of this article was first published in <a href=\"http://www.";

Index: surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- surveillance-vs-democracy.lt-diff.html      30 May 2021 19:32:32 -0000      
1.42
+++ surveillance-vs-democracy.lt-diff.html      3 Jul 2021 08:01:32 -0000       
1.43
@@ -11,7 +11,8 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.90</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.96 --&gt;
+&lt;!-- This page is derived from 
/server/standards/boilerplate.html</em></ins></span> --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
@@ -32,18 +33,18 @@
 <span class="removed"><del><strong>&lt;p&gt;by</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;address class="byline 
center"&gt;by</em></ins></span>
-&lt;a href="http://www.stallman.org/"&gt;Richard <span 
class="removed"><del><strong>Stallman&lt;/a&gt;&lt;/p&gt;
+&lt;a <span 
class="removed"><del><strong>href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
 
-&lt;blockquote&gt;&lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;
+&lt;blockquote&gt;&lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/address&gt;
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
 &lt;blockquote class="center"&gt;&lt;p&gt;&lt;em&gt;A</em></ins></span> 
version of this article was first published in <span 
class="removed"><del><strong>&lt;a 
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/"&gt;Wired&lt;/a&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;cite&gt;Wired&lt;/cite&gt; in 
October&nbsp;2013.&lt;br /&gt;
+<span 
class="inserted"><ins><em>&lt;cite&gt;Wired&lt;/cite&gt;</em></ins></span> in 
<span class="removed"><del><strong>October 
2013.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span> <span 
class="inserted"><ins><em>October&nbsp;2013.&lt;br /&gt;
 Also consider reading &ldquo;&lt;a
 
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
 radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
-&lt;cite&gt;The Guardian&lt;/cite&gt;</em></ins></span> in <span 
class="removed"><del><strong>October 
2013.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span> <span 
class="inserted"><ins><em>April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
 
 &lt;div class="article"&gt;
 
@@ -87,14 +88,15 @@
 can't trust nonfree software; the NSA
 &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/"&gt;uses&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;</em></ins></span>
 and
-even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+even &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</em></ins></span>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+but &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/"&gt;that</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/"&gt;that</em></ins></span>
 won't
 protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</em></ins></span>
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -116,22 +118,23 @@
 
 &lt;p&gt;An unnamed U.S. government official ominously told journalists in
 2011 that
-the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+the &lt;a <span 
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/"&gt;U.S.</em></ins></span>
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;&lt;/a&gt;
-Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+Sometimes &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</em></ins></span>
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</em></ins></span>
 Verizon&lt;/a&gt;
-and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+and &lt;a <span 
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</em></ins></span>
 other companies too&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's &lt;a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+<span 
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</em></ins></span>
 practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
@@ -151,7 +154,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+was &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</em></ins></span>
 to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -167,7 +170,7 @@
 
 &lt;p&gt;In</em></ins></span> addition, the state's surveillance staff will 
misuse the data
 for personal reasons.  Some NSA
-agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+agents &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</em></ins></span>
 U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -181,7 +184,7 @@
 with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+to &lt;a 
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
 wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
 knows
 of &lt;a href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many
@@ -197,7 +200,7 @@
 &lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
 <span class="removed"><del><strong>US 
&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>US&lt;/a&gt;, and most
-recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+recently &lt;a 
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
@@ -209,7 +212,7 @@
 working for hostile states&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Governments can easily use massive surveillance capability
-to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+to &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</em></ins></span>
 democracy directly&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Total surveillance accessible to the state enables the state to
@@ -236,7 +239,8 @@
 &lt;p&gt;However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or &lt;a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -284,7 +288,7 @@
 pertinent data to the <span 
class="inserted"><ins><em>company's</em></ins></span> server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
-too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+too.  &lt;a <span 
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</em></ins></span>
 give out their personal information&lt;/a&gt; except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -388,10 +392,10 @@
 systematically available to the state.&lt;/p&gt;
 
 &lt;p&gt;The NSA, through PRISM,
-has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+has &lt;a <span 
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies"&gt;gotten</em></ins></span>
 into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
 has saved all its phone call records since 1987
-and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+and &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</em></ins></span>
 them available to the DEA&lt;/a&gt; to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.  Some companies are praised
@@ -421,17 +425,17 @@
 &lt;p&gt;We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want <span 
class="inserted"><ins><em>to
 help</em></ins></span> the payee <span 
class="removed"><del><strong>to</strong></del></span> dodge
-taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+taxes.)  &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</em></ins></span>
 is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+for &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</em></ins></span>
 cash was first developed in the 1980s&lt;/a&gt;; <span 
class="inserted"><ins><em>the GNU software for doing
-this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  
Now</em></ins></span> we need
+this is called &lt;a href="https://taler.net/"&gt;GNU Taler&lt;/a&gt;.  
Now</em></ins></span> we need
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
 <span class="inserted"><ins><em>&lt;p&gt;Another possible method for anonymous 
payments would
-use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+use &lt;a href="/philosophy/phone-anonymous-payment.html"&gt;prepaid
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
 implement.&lt;/p&gt;</em></ins></span>
 
@@ -512,10 +516,10 @@
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+also &lt;a <span 
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</em></ins></span>
 the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+even &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</em></ins></span>
 the user's body activities&lt;/a&gt;.  It appears that
 the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
 collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
@@ -528,7 +532,7 @@
 &lt;p&gt;This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+the &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</em></ins></span>
 does
 with some or all phone companies&lt;/a&gt;.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -571,7 +575,7 @@
 photographers&lt;/a&gt;.)</em></ins></span>
 One city in California that required police to wear video cameras all
 the time
-found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+found &lt;a <span 
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</em></ins></span>
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
@@ -580,7 +584,7 @@
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</em></ins></span>
 or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -627,7 +631,7 @@
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
-&lt;div id="footer"&gt;
+&lt;div <span 
class="removed"><del><strong>id="footer"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="footer" role="contentinfo"&gt;</em></ins></span>
 &lt;div class="unprintable"&gt;
 
 &lt;p&gt;Please send general FSF &amp; GNU inquiries to
@@ -645,13 +649,13 @@
         to &lt;a href="mailto:web-translators@gnu.org"&gt;
         &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;For information on coordinating and submitting translations of
+        &lt;p&gt;For information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
         README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations
-README&lt;/a&gt; for information on coordinating and submitting translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -672,7 +676,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2015</strong></del></span> <span 
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020, 
2021</em></ins></span> Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -682,7 +686,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/05/30 19:32:32 $
+$Date: 2021/07/03 08:01:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- surveillance-vs-democracy.lt.po     30 May 2021 19:32:32 -0000      1.44
+++ surveillance-vs-democracy.lt.po     3 Jul 2021 08:01:32 -0000       1.45
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2015-12-16 13:11+0100\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -31,7 +31,10 @@
 msgstr "Kiek daug sekimo demokratija gali atlaikyti?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "pagal <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -164,11 +167,11 @@
 # | surveillance.  We can't trust nonfree software; the NSA <a
 # | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
 # | and even <a
-# | 
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\";>creates</a>
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
 # | security weaknesses in nonfree software to invade our own computers and
 # | routers.  Free software gives us control of our own computers, but <a
-# | href=\"http://www.wired.com/opinion/2013/10/149481/\";>that won't protect
-# | our privacy once we set foot on the Internet</a>.
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
 #, fuzzy
 #| msgid ""
 #| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -190,10 +193,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -212,8 +215,24 @@
 "internetą</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -246,19 +265,48 @@
 "žurnalistu yra per daug sekimo &ndash; per daug ištverti demokratijai."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Neįvardintas JAV vyriausybės atstovas 2011&nbsp;m. žurnalistams 
grėsmingai "
 "pranešė, kad <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
@@ -274,10 +322,27 @@
 "verizon-2013-06-07\">iš kitų kompanijų irgi</a>."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -297,12 +362,34 @@
 msgstr "Informacija, surinkus, bus netinkamai panaudota"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -331,7 +418,7 @@
 #. type: Content of: <div><div><p>
 # | In addition, the state's surveillance staff will misuse the data for
 # | personal reasons.  Some NSA agents <a
-# | 
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\";>used
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
 # | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
 # | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
 # | says it has caught and punished this a few times; we don't know how many
@@ -344,7 +431,7 @@
 # | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
 # | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
 # | signatures to get authorization to <a
-# | 
href=\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\";>
+# | 
href=\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\";>
 # | wiretap someone who was the object of a romantic obsession</a>. The AP
 # | knows of <a
 # | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
@@ -365,7 +452,7 @@
 #| "&rdquo;"
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -378,7 +465,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -406,7 +493,7 @@
 # | 
{+href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,+}
 # | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
 # | [-US </a>.-] {+US</a>, and most recently <a
-# | 
href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\";>Turkey</a>.
+# | 
href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\";>Turkey</a>.
 # |  (Turkey's confusion about who had really used the Bylock program only
 # | exacerbated the basic deliberate injustice of arbitrarily punishing people
 # | for having used it.)+}
@@ -426,7 +513,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -455,9 +542,17 @@
 "valstybėms</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Vyriausybės gali lengvai naudoti masinio sekimo gebėjimą <a href=\"http://";
@@ -497,10 +592,18 @@
 "be išimčių privalomai užtikrinti amžinai."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Tačiau, tokios teisinės apsaugos yra nepatikimos: pagal neseną istoriją, 
jos "
 "gali būti atšauktos (kaip pagal FISA pataisų aktą), atidėtos arba <a 
href="
@@ -609,7 +712,7 @@
 
 #. type: Content of: <div><div><p>
 # | Protect your friends' and acquaintances' privacy, too.  <a
-# | 
href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\";>Don't
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
 # | give out their personal information</a> except how to contact them, and
 # | never give any web site your list of email or phone contacts.  Don't tell
 # | a company such as Facebook anything about your friends that they might not
@@ -630,7 +733,7 @@
 #| "going to give yours, since they pressure other people to surrender their "
 #| "privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -870,10 +973,11 @@
 
 #. type: Content of: <div><div><p>
 # | The NSA, through PRISM, has <a
-# | href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten into
-# | the databases of many large Internet corporations</a>.  AT&amp;T has saved
-# | all its phone call records since 1987 and <a
-# | 
href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\";>makes
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
 # | them available to the DEA</a> to search on request.  Strictly speaking,
 # | the U.S.  government does not possess that data, but in practical terms it
 # | may as well possess it.  {+Some companies are praised for <a
@@ -894,18 +998,18 @@
 #| "it."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "NSA, per PRISM, <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">pateko į daugelio didelių interneto korporacijų "
@@ -956,14 +1060,14 @@
 # | We could correct both problems by adopting a system of anonymous
 # | payments&mdash;anonymous for the payer, that is.  (We don't want {+to
 # | help+} the payee [-to-] dodge taxes.)  <a
-# | 
href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\";>Bitcoin
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
 # | is not anonymous</a>, though there are efforts to develop ways to pay
 # | anonymously with Bitcoin.  However, technology for <a
-# | href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\";>digital
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
 # | cash was first developed in the 1980s</a>; {+the GNU software for doing
-# | this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now+} we need
-# | only suitable business arrangements, and for the state not to obstruct
-# | them.
+# | this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now+} we
+# | need only suitable business arrangements, and for the state not to
+# | obstruct them.
 #, fuzzy
 #| msgid ""
 #| "We could correct both problems by adopting a system of anonymous "
@@ -978,12 +1082,12 @@
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -998,9 +1102,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -1169,18 +1273,42 @@
 msgstr "Komunikacinių asmeninių įrašų ištaisymas"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Prieigos prie interneto tiekėjai ir telefoninio ryšio kompanijos laiko "
 "išsamius savo naudotojų kontaktų duomenis (naršymas, telefoniniai 
skambučiai "
@@ -1207,10 +1335,32 @@
 "informaciją, nesant teismo sprendimo sekti tam tikrą pusę."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1276,6 +1426,30 @@
 "skaitmeninėms sistemoms masiškai kaupti asmeninius įrašus."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1285,7 +1459,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1304,12 +1478,33 @@
 "pirmenybę."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1416,6 +1611,7 @@
 "pasiūlymai gali būti atsiųsti į <a 
href=\"mailto:webmasters@gnu.org\";>&lt;"
 "webmasters@gnu.org&gt;</a>."
 
+# TODO: submitting -> contributing.
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -1423,14 +1619,20 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Mes dirbame sunkiai ir labai stengiamės, kad pateiktume tikslius, geros "
@@ -1442,11 +1644,12 @@
 "PERSKAITYKITEMANE</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020+} Richard
-# | Stallman
+# | Copyright &copy; [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020, 2021+}
+# | Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2015 Richard Stallman"
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 msgstr "Copyright &copy; 2015 Richard Stallman"
 
 #. type: Content of: <div><p>
@@ -1470,6 +1673,20 @@
 msgstr "Atnaujinta:"
 
 #~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "Mes dirbame sunkiai ir labai stengiamės, kad pateiktume tikslius, geros "
+#~ "kokybės vertimus.  Tačiau mes nesame išimtys netobulumui.  Prašome "
+#~ "siųskite savo komentarus ir bendrus pasiūlymus šia prasme į <a href="
+#~ "\"mailto:web-translators@gnu.org\";>&lt;web-translators@gnu.org&gt;</a>.</"
+#~ "p>\n"
+#~ "<p>Mūsų tinklapių vertimų koordinavimo ir pateikimo informaciją "
+#~ "pamatykite <a href=\"/server/standards/README.translations.html\">Vertimų 
"
+#~ "PERSKAITYKITEMANE</a>."
+
+#~ msgid ""
 #~ "A version of this article was first published in <a href=\"http://www.";
 #~ "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
 #~ "survive-surveillance/\">Wired</a> in October 2013."

Index: surveillance-vs-democracy.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- surveillance-vs-democracy.ml.po     3 Jul 2021 07:55:45 -0000       1.18
+++ surveillance-vs-democracy.ml.po     3 Jul 2021 08:01:32 -0000       1.19
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2021-06-01 17:22+0200\n"
 "Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
 "Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "Plural-Forms: nplurals=2; plural=n != 1;\n"
 "X-Generator: Lokalize 20.12.0\n"
 
@@ -30,7 +31,10 @@
 msgstr "ജനാധിപത്യത്തിനു് 
എത്രത്തോളം സർവേയിലൻസിനെ 
ചെറുക്കുവാൻ കഴിയും?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>റിച്ചാർഡ് 
സ്റ്റാൾമാൻ</a> എഴുതിയതു്"
 
 #. type: Content of: <blockquote><p><em>
@@ -123,6 +127,32 @@
 "അറിയുന്നതെവിടെയാണോ ആ 
തോതിലേക്കു് സർവേയിലൻസിനെ 
ചുരുക്കണം."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -130,10 +160,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -152,8 +182,24 @@
 "സ്വകാര്യതയെ 
സംരക്ഷിക്കില്ല</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -187,19 +233,48 @@
 "ജനാധിപത്യത്തിനു 
താങ്ങാവുന്നതിലുമപ്പുറം."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "<a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-";
 
"media-and-law-summer-2011/lessons-wye-river\">റിപ്പോർട്ടർമാരോടു
 കോടതിയിൽ "
@@ -216,10 +291,27 @@
 "കോടതിയിൽ ഹാജരാക്കപ്പെടാൻ അ
വർ ഉത്തരവിടാറുണ്ടെന്നു 
സ്നോഡൻ നമുക്കു 
കാണിച്ചുതന്നു."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +332,34 @@
 msgstr "വിവരങ്ങൾ, ഒരിക്കൽ 
ശേഖരിച്ചാൽ പിന്നെ, ദുരുപയോഗം 
ചെയ്യപ്പെടുന്നു"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -281,9 +395,50 @@
 "കെട്ടുകഥയാണു്."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -296,7 +451,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +478,31 @@
 "ഉദാഹരണങ്ങളും</a> എപിയ്ക്കു് (AP) 
അറിയാം."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -330,7 +510,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +543,17 @@
 "തകർച്ചയുണ്ടാകുവാനും 
സാധ്യതയുണ്ടു്."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "വലിയതോതിലുള്ള സർവേയിലൻസ് 
ശേഷി ഉപയോഗിച്ചു് <a href=\"http://www.nytimes.";
@@ -406,10 +594,18 @@
 "നടപ്പിലാക്കുകയാണെങ്കിൽ."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "എന്നിരുന്നാലും, അത്തരം നിയമ 
പരിരക്ഷകൾ അസ്ഥിരമാണു് 
എന്നാണു് സമീപകാല ചരിത്രം 
കാണിച്ചുതരുന്നതു്, "
 "അവ റദ്ദുചെയ്യപ്പെടാം (ഫിസ (FISA) 
അമെന്റ്മെന്റ് ആക്ടിലേതു 
പോലെ), മാറ്റി വെയ്ക്കപ്പെടാം, "
@@ -500,8 +696,29 @@
 "അതാവശ്യപ്പെടും."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -687,20 +904,49 @@
 "ശേഖരിച്ച ഡാറ്റ യഥാക്രമം 
ഭരണകൂടത്തിനു ലഭ്യമാകും."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "പ്രിസം (PRISM) പ്രോഗ്രാം വഴി, 
എൻഎസ്എ, <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">പല ഭീമൻ ഇന്റർനെറ്റ് 
കോർപ്പറേഷനുകളുടെ 
ഡാറ്റബേസിലേക്കും "
@@ -751,15 +997,38 @@
 "സ്വകാര്യതയെ ലംഘിക്കാനുള്ള 
ഒട്ടേറെ 
ഒഴിവുകഴിവുകളാണെന്നു് 
നമുക്കെല്ലാം ബോധ്യമുണ്ടു 
താനും."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -775,10 +1044,20 @@
 "തടയാതിരിക്കുന്നതിനും അ
നുയോജ്യമായ 
സജ്ജീകരണങ്ങളാണു്."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "അജ്ഞാതമായി 
വിലയടക്കുന്നതിനുള്ള മറ്റൊരു 
സാധ്യമായ മാർഗം <a href=\"https://stallman.org/";
 "articles/anonymous-payments-thru-phones.html\">പ്രീപെയ്ഡ് 
ഫോൺ കാർഡുകൾ</a> "
@@ -925,18 +1204,42 @@
 msgstr "വ്യക്തിഗത ആശയവിനിമയ 
ഫയലുകൾക്കുള്ള പരിഹാരം"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "ഇന്റർനെറ്റു സേവന ദായകരും 
ടെലിഫോൺ കമ്പനികളും അവരുടെ 
ഉപയോക്താക്കളുടെ 
കോണ്ടാക്ടുകളിൽ സമഗ്രമായ "
 "ഡാറ്റ സൂക്ഷിച്ചു വെക്കുന്നു 
(ബ്രൗസിങ്, ഫോൺ കോളുകൾ, 
തുടങ്ങിയവ). മൊബൈൽ ഫോണുകൾ 
ഉപയോഗിച്ചു്, <a "
@@ -963,10 +1266,32 @@
 "കോടതി ഉത്തരവൊന്നും ഇല്ലാതെ 
ഈ വിവരങ്ങൾ സൂക്ഷിക്കുവാൻ അ
നുവദിക്കരുതു്."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1028,6 +1353,30 @@
 "ഡിജിറ്റൽ സിസ്റ്റങ്ങളിൽ 
വൻതോതിൽ വ്യക്തിഗത ഫയലുകൾ 
സ്വരൂപിക്കുന്നതു 
തടയുകയാണെങ്കിൽ."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1037,7 +1386,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1055,12 +1404,33 @@
 "police-edition\">അവരുടെ ബലപ്രയോഗം 60% 
കുറഞ്ഞു</a>. എസിഎൽയു (ACLU) ഇതിനു് അ
നുകൂലമാണു്."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1170,6 +1540,7 @@
 "നിര്‍ദ്ദേശങ്ങളും അ
ഭിപ്രായങ്ങളും <a 
href=\"mailto:webmasters@gnu.org\";>&lt;"
 "webmasters@gnu.org&gt;</a> എന്ന 
വിലാസത്തിലേയ്ക്കു് 
എഴുതാവുന്നതാണു്."
 
+# TODO: submitting -> contributing.
 # type: Content of: <div><p>
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
@@ -1178,14 +1549,20 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "ഗ്നു താളുകളുടെ മലയാളം 
പരിഭാഷകള്‍ കൃത്യവും 
നിലവാരമുള്ളതുമാക്കാൻ 
ഞങ്ങള്‍ പരമാവധി 
ശ്രമിക്കുന്നുണ്ടു്. "
@@ -1196,9 +1573,10 @@
 "README.translations.html\">Translations README</a> നോക്കുക."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman | "
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman | "
 "റിച്ചാർഡ് സ്റ്റാൾമാൻ"
 
 #. type: Content of: <div><p>
@@ -1223,12 +1601,10 @@
 msgid "Updated:"
 msgstr "പുതുക്കിയതു്:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman | "
-"റിച്ചാർഡ് സ്റ്റാൾമാൻ"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman | "
+#~ "റിച്ചാർഡ് സ്റ്റാൾമാൻ"
 
 #~ msgid ""
 #~ "Thanks to Edward Snowden's disclosures, we know that the current level of "

Index: surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- surveillance-vs-democracy.nl.po     3 Jul 2021 07:55:45 -0000       1.54
+++ surveillance-vs-democracy.nl.po     3 Jul 2021 08:01:32 -0000       1.55
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2021-05-06 20:44+0200\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -31,7 +32,10 @@
 msgstr "Hoeveel controle kan onze democratie verdragen?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "door <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -124,6 +128,32 @@
 "klokkenluiders erop kunnen vertrouwen dat zij veilig zijn."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -131,10 +161,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -153,8 +183,24 @@
 "internet begeven</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -188,19 +234,48 @@
 "verdragen."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Een naamloze overheidsambtenaar in de VS vertelde in 2011 aan journalisten "
 "dat de <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-";
@@ -216,10 +291,27 @@
 "verizon-2013-06-07\">ook andere bedrijven</a>."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -239,12 +331,34 @@
 msgstr "Eenmaal verzamelde informatie zal worden misbruikt"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -279,9 +393,50 @@
 "geloven als je dat wilt."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -294,7 +449,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -322,6 +477,31 @@
 "com/699236946e3140659fff8a2362e16f43\">veel meer voorbeelden in de VS</a>."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -329,7 +509,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +543,17 @@
 "shtml\">krakers die voor vijandelijke landen werken</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Overheden kunnen massale surveillance-mogelijkheden gemakkelijk gebruiken om "
@@ -407,10 +595,18 @@
 "aangenomen en zonder enige uitzondering altijd worden doorgevoerd."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Zulke wettelijke bescherming is echter wankel: zoals de recente geschiedenis "
 "ons laat zien, kan een dergelijke wet worden teruggedraaid (zoals in de FISA "
@@ -503,8 +699,29 @@
 "ook dat je al jouw gegevens aan een server overhandigt."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -695,20 +912,49 @@
 "overheid."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "De NSA heeft via PRISM <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">toegang verkregen tot gegevensbanken van veel grote "
@@ -761,15 +1007,38 @@
 "om privacy te schenden en niet iets om je aan te houden."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -785,10 +1054,20 @@
 "met bedrijven nodig, en een overheid die geen belemmering vormt."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "<a href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
 "\">Prepaid telefoonkaarten</a> zijn een andere mogelijke manier om anonieme "
@@ -943,18 +1222,42 @@
 msgstr "Oplossing voor communicatiedossiers"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Internetaanbieders en telefoonbedrijven bewaren uitgebreide contactgegevens "
 "van hun klanten (browsing, telefoongesprekken, enz.). Met mobiele telefoons "
@@ -983,10 +1286,32 @@
 "een rechter om een bepaalde partij te volgen."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1054,6 +1379,30 @@
 "de openbaring."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1063,7 +1412,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1081,12 +1430,33 @@
 "dwang met 60% was verminderd</a>.  De ACLU is hier voorstander van."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1203,14 +1573,20 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "We doen ons best om goede vertalingen te maken maar staan altijd open voor "
@@ -1220,8 +1596,10 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1245,8 +1623,18 @@
 msgid "Updated:"
 msgstr "Bijgewerkt:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "We doen ons best om goede vertalingen te maken maar staan altijd open "
+#~ "voor verbeteringen. Suggesties, op- en aanmerkingen sturen aan: <a href="
+#~ "\"mailto:web-translators@gnu.org\";>&lt;web-translators@gnu.org&gt;</a>.</"
+#~ "p> <p>Zie <a href=\"/server/standards/README.translations.html\"> "
+#~ "Translations README</a> voor informatie over het onderhoud van "
+#~ "vertalingen op deze website."
+
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- surveillance-vs-democracy.pot       17 Dec 2020 21:31:17 -0000      1.55
+++ surveillance-vs-democracy.pot       3 Jul 2021 08:01:32 -0000       1.56
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -27,7 +27,7 @@
 msgstr ""
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr ""
 
 #. type: Content of: <blockquote><p><em>
@@ -99,17 +99,17 @@
 "software; the NSA <a "
 
"href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
 "
 "and even <a "
-"href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\";>creates</a>
 "
+"href=\"https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\";>creates</a>
 "
 "security weaknesses in nonfree software to invade our own computers and "
 "routers.  Free software gives us control of our own computers, but <a "
-"href=\"http://www.wired.com/opinion/2013/10/149481/\";>that won't protect our "
-"privacy once we set foot on the Internet</a>."
+"href=\"https://www.wired.com/opinion/2013/10/149481/\";>that won't protect "
+"our privacy once we set foot on the Internet</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
 "<a "
-"href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\";>Bipartisan
 "
+"href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\";>Bipartisan
 "
 "legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a> in "
 "the U.S. is being drawn up, but it relies on limiting the government's use "
 "of our virtual dossiers.  That won't suffice to protect whistleblowers if "
@@ -133,16 +133,16 @@
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a "
-"href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.
 "
+"href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.
 "
 "would not subpoena reporters because &ldquo;We know who you're talking "
 "to.&rdquo;</a> Sometimes <a "
-"href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\";>journalists'
 "
+"href=\"https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\";>journalists'
 "
 "phone call records are subpoenaed</a> to find this out, but Snowden has "
 "shown us that in effect they subpoena all the phone call records of everyone "
 "in the U.S., all the time, <a "
 
"href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
 "
 "Verizon</a> and <a "
-"href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\";>from
 "
+"href=\"https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\";>from
 "
 "other companies too</a>."
 msgstr ""
 
@@ -151,7 +151,7 @@
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
 "U.S. government's <a "
-"href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf\";>systematic "
+"href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf\";>systematic "
 "practice of infiltrating peaceful dissident groups</a> on the pretext that "
 "there might be terrorists among them.  The point at which surveillance is "
 "too much is the point at which the state can find who spoke to a known "
@@ -169,7 +169,7 @@
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
 "court, which said it was <a "
-"href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/\";>unable to "
+"href=\"https://www.wired.com/threatlevel/2013/09/nsa-violations/\";>unable to "
 "effectively hold the NSA accountable</a>.) Suspicion of a crime will be "
 "grounds for access, so once a whistleblower is accused of "
 "&ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an "
@@ -190,7 +190,7 @@
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a "
-"href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\";>used
 "
+"href=\"https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\";>used
 "
 "U.S. surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
 "has caught and punished this a few times; we don't know how many other times "
@@ -203,7 +203,7 @@
 
"href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
 "
 "digital systems</a>.  In 2016, a prosecutor was accused of forging judges' "
 "signatures to get authorization to <a "
-"href=\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\";>
 "
+"href=\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\";>
 "
 "wiretap someone who was the object of a romantic obsession</a>. The AP knows "
 "of <a href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many "
 "other instances in the US</a>."
@@ -218,7 +218,7 @@
 
"href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
 "
 "<a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the "
 "US</a>, and most recently <a "
-"href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\";>Turkey</a>.
  "
+"href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\";>Turkey</a>.
  "
 "(Turkey's confusion about who had really used the Bylock program only "
 "exacerbated the basic deliberate injustice of arbitrarily punishing people "
 "for having used it.)"
@@ -235,7 +235,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Governments can easily use massive surveillance capability to <a "
-"href=\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\";>subvert
 "
+"href=\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\";>subvert
 "
 "democracy directly</a>."
 msgstr ""
 
@@ -266,7 +266,7 @@
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-"href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"href=\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -326,7 +326,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a "
-"href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\";>Don't
 "
+"href=\"https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\";>Don't
 "
 "give out their personal information</a> except how to contact them, and "
 "never give any web site your list of email or phone contacts.  Don't tell a "
 "company such as Facebook anything about your friends that they might not "
@@ -444,10 +444,10 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "The NSA, through PRISM, has <a "
-"href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten into the "
-"databases of many large Internet corporations</a>.  AT&amp;T has saved all "
-"its phone call records since 1987 and <a "
-"href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\";>makes
 "
+"href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten
 "
+"into the databases of many large Internet corporations</a>.  AT&amp;T has "
+"saved all its phone call records since 1987 and <a "
+"href=\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\";>makes
 "
 "them available to the DEA</a> to search on request.  Strictly speaking, the "
 "U.S.  government does not possess that data, but in practical terms it may "
 "as well possess it.  Some companies are praised for <a "
@@ -485,20 +485,20 @@
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
 "payee dodge taxes.)  <a "
-"href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\";>Bitcoin
 "
+"href=\"https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\";>Bitcoin
 "
 "is not anonymous</a>, though there are efforts to develop ways to pay "
 "anonymously with Bitcoin.  However, technology for <a "
-"href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\";>digital cash "
-"was first developed in the 1980s</a>; the GNU software for doing this is "
-"called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now we need only "
+"href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.html\";>digital "
+"cash was first developed in the 1980s</a>; the GNU software for doing this "
+"is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now we need only "
 "suitable business arrangements, and for the state not to obstruct them."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
 "Another possible method for anonymous payments would use <a "
-"href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid
 "
-"phone cards</a>.  It is less convenient, but very easy to implement."
+"href=\"/philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  "
+"It is less convenient, but very easy to implement."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -595,10 +595,10 @@
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
 "they also <a "
-"href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record
 "
+"href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record
 "
 "the user's physical location</a>.  They keep these dossiers for a long time: "
 "over 30 years, in the case of AT&amp;T.  Soon they will even <a "
-"href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\";>record
 "
+"href=\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\";>record
 "
 "the user's body activities</a>.  It appears that the <a "
 
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
 "
 "collects cell phone location data</a> in bulk."
@@ -617,7 +617,7 @@
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
 "generated&mdash;which is what the <a "
-"href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\";>U.S.
 "
+"href=\"https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\";>U.S.
 "
 "does with some or all phone companies</a>.  We would have to rely on "
 "prohibiting that by law.  However, that would be better than the current "
 "situation, where the relevant law (the PAT RIOT Act) does not clearly "
@@ -664,7 +664,7 @@
 
"href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
 "
 "photographers</a>.)  One city in California that required police to wear "
 "video cameras all the time found <a "
-"href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\";>their
 "
+"href=\"https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\";>their
 "
 "use of force fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
 
@@ -675,10 +675,10 @@
 "are not people, and not entitled to human rights</a>.  It is legitimate to "
 "require businesses to publish the details of processes that might cause "
 "chemical, biological, nuclear, fiscal, computational (e.g., <a "
-"href=\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
-"hazards to society, to whatever level is needed for public well-being.  The "
-"danger of these operations (consider the BP oil spill, the Fukushima "
-"meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
+"href=\"https://DefectiveByDesign.org\";>DRM</a>) or political (e.g., "
+"lobbying) hazards to society, to whatever level is needed for public "
+"well-being.  The danger of these operations (consider the BP oil spill, the "
+"Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgstr ""
 
 #. type: Content of: <div><div><p>
@@ -751,7 +751,7 @@
 #
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
 #
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
@@ -759,11 +759,12 @@
 msgid ""
 "Please see the <a "
 "href=\"/server/standards/README.translations.html\">Translations README</a> "
-"for information on coordinating and submitting translations of this article."
+"for information on coordinating and contributing translations of this "
+"article."
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard 
Stallman"
 msgstr ""
 
 #. type: Content of: <div><p>

Index: surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- surveillance-vs-democracy.pt-br.po  3 Jul 2021 07:55:45 -0000       1.69
+++ surveillance-vs-democracy.pt-br.po  3 Jul 2021 08:01:32 -0000       1.70
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2020-12-19 10:30-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 3.38.0\n"
 
@@ -33,7 +34,9 @@
 msgstr "Qual o Nível de Vigilância Que a Democracia Pode Suportar?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "por <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -126,6 +129,20 @@
 "seguros."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -133,10 +150,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -154,8 +171,17 @@
 "privacidade quando utilizamos a Internet</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -188,19 +214,34 @@
 "tolerar."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Um oficial não identificado do governo dos EUA falou de forma ameaçadora a "
 "jornalistas em 2011 que os <a href=\"http://www.rcfp.org/browse-media-law-";
@@ -217,10 +258,19 @@
 "empresas operadoras de comunicação também</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +290,24 @@
 msgstr "A Informação, Uma Vez Coletada, Será Utilizada de Modo Abusivo"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -280,9 +342,30 @@
 "fadas que podemos acreditar se quisermos."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -295,7 +378,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -322,6 +405,20 @@
 "com/699236946e3140659fff8a2362e16f43\">muitas outras ocorrências nos 
EUA</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -329,7 +426,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +460,14 @@
 "hostis</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Governos podem facilmente usar a capacidade de vigilância em massa para <a "
@@ -407,10 +509,15 @@
 "para sempre."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Porém, tais proteções legais são precárias: como a história recente 
mostra, "
 "elas pode ser repelidas (como aconteceu com o <i>FISA Amendments Act</i>), "
@@ -501,8 +608,20 @@
 "dados pertinentes do servidor da empresa."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -688,20 +807,35 @@
 "Estado."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "A NSA, por meio do software de vigilância PRISM, <a href=\"https://www.";
 "commondreams.org/headline/2013/08/23-2\">conseguiu entrar nas bases de dados "
@@ -755,15 +889,27 @@
 "para violação de privacidade do que compromisso de cumprimento."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -779,10 +925,16 @@
 "Estado não o obstrua."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Um outro método possível para pagamentos anônimos seria usar <a href="
 "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
@@ -934,18 +1086,31 @@
 msgstr "Remédio para Dossiês de Comunicação"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Provedores de serviços de Internet e de telefone mantém dados extensivos de 
"
 "seus contatos de usuários (navegação, chamadas telefônicas etc.). Com "
@@ -973,10 +1138,22 @@
 "tempo, na ausência de uma ordem judicial para vigiar uma determinada pessoa."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1042,6 +1219,20 @@
 "sistemas digitais acumulem dossiês massivos antes do fato."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1051,7 +1242,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1070,12 +1261,23 @@
 "\">o uso da força deles caiu em 60%</a>;. A ACLU concorda com isto."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1239,14 +1441,14 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "A equipe de traduções para o português brasileiro se esforça para 
oferecer "
@@ -1254,12 +1456,14 @@
 "favor, envie seus comentários e sugestões em geral sobre as traduções 
para "
 "<a href=\"mailto:web-translators@gnu.org\";>&lt;web-translators@gnu.org&gt;</"
 "a>. </p><p>Consulte o <a href=\"/server/standards/README.translations.html"
-"\">Guia para as traduções</a> para mais informações sobre a coordenação 
e o "
-"envio de traduções das páginas deste site."
+"\">Guia para as traduções</a> para mais informações sobre a coordenação 
e a "
+"contribuição com traduções das páginas deste site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1288,8 +1492,6 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- surveillance-vs-democracy.ru.po     3 Jul 2021 07:55:45 -0000       1.125
+++ surveillance-vs-democracy.ru.po     3 Jul 2021 08:01:32 -0000       1.126
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2020-07-18 09:27+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -30,7 +31,10 @@
 
 # type: Content of: <p>
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Ричард Столмен</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -125,6 +129,32 @@
 "до величины, при которой осведомители 
будут знать, что они в безопасности."
 
 #. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance.  We can't trust
+# | nonfree software; the NSA <a
+# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
+# | and even <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers.  Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -132,10 +162,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -154,8 +184,24 @@
 "когда мы выходим в Интернет</a>."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
+# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
+# | sufficient to identify him or her.  We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -189,19 +235,48 @@
 "слишком велика, чтобы демократия могла ее 
выдержать."
 
 #. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
+# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
+# | would not subpoena reporters because &ldquo;We know who you're talking
+# | to.&rdquo;</a> Sometimes <a
+# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
+# | Verizon</a> and <a
+# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Некое должностное лицо администрации США 
зловеще заявило журналистам в "
 "2011&nbsp;году, что <a 
href=\"http://www.rcfp.org/browse-media-law-resources/";
@@ -217,10 +292,27 @@
 "into-networks-beyond-verizon-2013-06-07\"> а также от других 
компаний</a>."
 
 #. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them.  The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +332,34 @@
 msgstr "Однажды собранными сведениями будут 
злоупотреблять"
 
 #. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# |  That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules.  (The NSA has misled the
+# | FISA court, which said it was <a
+# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -281,9 +395,50 @@
 "можем верить, если нам угодно."
 
 #. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons.  Some NSA agents <a
+# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
+# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught.  But these events shouldn't surprise us,
+# | because police have long <a
+# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as &ldquo;running a plate for a
+# | date.&rdquo; This practice has expanded with <a
+# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
+# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -296,7 +451,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +478,31 @@
 "примеров в США</a>."
 
 #. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited.  Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
+# | US</a>, and most recently <a
+# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |  (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -330,7 +510,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -364,9 +544,17 @@
 "государства</a>."
 
 #. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Правящие режимы могут легко 
воспользоваться возможностью массовой 
слежки, "
@@ -408,10 +596,18 @@
 "исключений."
 
 #. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Однако такой юридической защиты не 
достаточно: как показывают недавние "
 "события, они могут быть отозваны (как 
Закон о поправках в FISA), действие их "
@@ -502,8 +698,29 @@
 "обрабатываемых данных на сервер компании."
 
 #. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too.  <a
+# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts.  Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
+# | all.  Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -689,20 +906,49 @@
 "государству."
 
 #. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
+# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
+# | into the databases of many large Internet corporations</a>.  AT&amp;T has
+# | saved all its phone call records since 1987 and <a
+# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request.  Strictly speaking,
+# | the U.S.  government does not possess that data, but in practical terms it
+# | may as well possess it.  Some companies are praised for <a
+# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place.  In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "АНБ с помощью PRISM <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\"> проникло в базы данных 
многих крупных корпораций в "
@@ -756,15 +1002,38 @@
 "конфиденциальности, чем намерения 
соблюдать ее."
 
 #. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
+# | the payee dodge taxes.)  <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin.  However, technology for <a
+# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -780,10 +1049,20 @@
 "препятствовало бы этому."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>.  It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Другой возможный метод анонимных 
платежей&nbsp;&mdash; <a href=\"https://";
 "stallman.org/articles/anonymous-payments-thru-phones.html\"> 
предварительно "
@@ -932,18 +1211,42 @@
 msgstr "Меры против коммуникационных досье"
 
 #. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc).  With mobile phones,
+# | they also <a
+# | 
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record-]
+# | 
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\";>record+}
+# | the user's physical location</a>.  They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&amp;T.  Soon they will even <a
+# | 
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>.  It appears that the <a
+# | 
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\";>NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Поставщики услуг Интернета и телефонные 
компании хранят обширные сведения о "
 "контактах своих пользователей (просмотр 
страниц Интернета, телефонные вызовы "
@@ -973,10 +1276,32 @@
 "судебном порядке."
 
 #. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated&mdash;which is what the <a
+# | 
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>.  We would have to rely on
+# | prohibiting that by law.  However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice.  In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1041,6 +1366,30 @@
 "досье цифровыми системами."
 
 #. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored.  (In fact, police have their
+# | own jargon term for perjury, &ldquo;<a
+# | 
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302\";>testilying</a>,&rdquo;
+# | since they do it so frequently, particularly about protesters and <a
+# | 
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\";>
+# | photographers</a>.)  One city in California that required police to wear
+# | video cameras all the time found <a
+# | 
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>.  The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1050,7 +1399,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1069,12 +1418,33 @@
 "применение силы полицейскими сократилось 
на 60%</a>. ACLU поддерживает это."
 
 #. type: Content of: <div><div><p>
+# | <a
+# | 
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\";>Corporations
+# | are not people, and not entitled to human rights</a>.  It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being.  The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1187,14 +1557,20 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Мы старались сделать этот перевод точным 
и качественным, но исключить "
@@ -1205,11 +1581,12 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman<br /"
-">Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc. (translation)"
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard "
+"Stallman<br />Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
+"Software Foundation, Inc. (translation)"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1233,13 +1610,11 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard "
-"Stallman<br />Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
-"Software Foundation, Inc. (translation)"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman<br /"
+#~ ">Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+#~ "Foundation, Inc. (translation)"
 
 #~ msgid ""
 #~ "A version of this article was first published in <a href=\"http://www.";

Index: surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- surveillance-vs-democracy.sq.po     31 May 2021 11:30:29 -0000      1.110
+++ surveillance-vs-democracy.sq.po     3 Jul 2021 08:01:32 -0000       1.111
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "X-Generator: Poedit 2.4.2\n"
 
 #. type: Content of: <title>
@@ -29,7 +30,9 @@
 msgstr "Sa Mbikëqyrje Mund të Përballojë Demokracia?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "nga <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -124,6 +127,20 @@
 "sekreteve ta dinë se nuk rrezikohen."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -131,10 +148,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -152,8 +169,17 @@
 "na e mbron privatësinë, pasi fusim këmbët në Internet</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -188,19 +214,34 @@
 "mbikëqyrjeje&mdash;shumë, për ta përballuar demokracia."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Një zyrtar i paemër i qeverisë së ShBA-ve u tha në mënyrë ogurzezë "
 "gazetarëve më 2011 se <a href=\"http://www.rcfp.org/browse-media-law-";
@@ -217,10 +258,19 @@
 "tjera po ashtu</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +290,24 @@
 msgstr "Informacioni, Pasi Mblidhet, Do Të Keqpërdoret"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -280,9 +342,30 @@
 "ta besojmë, në daçim."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -295,7 +378,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +406,20 @@
 "a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -330,7 +427,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -364,9 +461,14 @@
 "shtetesh armiqësore</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Qeveritë mund ta përdorin lehtësisht mundësinë për mbikëqyrje masive 
për <a "
@@ -408,10 +510,15 @@
 "zbatohen përgjithmonë pa përjashtime."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Por, mbrojtje të tilla ligjore janë pre e synimeve të palëve të 
ndryshme: "
 "siç e tregon historia e kohëve të fundit, ato mund anulohen (si tek FISA "
@@ -503,8 +610,20 @@
 "dorëzoni në shërbyesin e kompanisë krejt të dhënat përkatëse."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -695,20 +814,35 @@
 "mund t’i ketë të dhënat që mbledhin kompanitë."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "Përmes PRISM-it, NSA-ja ka <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">hyrë në bazat e të dhënave të mjaft korporatave 
të "
@@ -762,15 +896,27 @@
 "mbrojtur atë."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -787,10 +933,16 @@
 "ato."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Një tjetër metodë për pagesa anonime do të mund të përdorte <a href="
 "\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>karta "
@@ -943,18 +1095,31 @@
 msgstr "Kurë për Dosjet e Komunikimeve"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Mundësuesit e shërbimeve Internet dhe kompanitë telefonike ruajnë të 
dhëna "
 "të zgjeruara mbi kontaktet e përdoruesve të tyre (shfletim, thirrje "
@@ -983,10 +1148,22 @@
 "për të përgjuar një palë të caktuar."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1052,6 +1229,20 @@
 "dixhitalë grumbullimin e dosjeve masive përpara faktit të kryer."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1061,7 +1252,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1079,12 +1270,23 @@
 "\">përdorimi i forcës prej tyre ra me 60%</a>.  ACLU është në favor të 
kësaj."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1190,6 +1392,7 @@
 "të dërgohen te <a href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu."
 "org&gt;</a>."
 
+# TODO: submitting -> contributing.
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -1197,14 +1400,19 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Përpiqemi fort dhe bëjmë sa mundemi për të ofruar përkthime me cilësi 
të "
@@ -1216,7 +1424,10 @@
 "standards/README.translations.html\">README për përkthimet</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 msgstr ""
 "Të drejta kopjimi &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
 

Index: surveillance-vs-democracy.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- surveillance-vs-democracy.tr.po     3 Jul 2021 07:55:45 -0000       1.15
+++ surveillance-vs-democracy.tr.po     3 Jul 2021 08:01:32 -0000       1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2021-01-15 18:53+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 "X-Generator: Poedit 2.4.1\n"
 
 #. type: Content of: <title>
@@ -28,7 +29,9 @@
 msgstr "Demokrasi Ne Kadar Gözetime Dayanabilir?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "yazan <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -121,6 +124,20 @@
 "indirmeliyiz."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -128,10 +145,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -150,8 +167,17 @@
 "korumuyor</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -184,19 +210,34 @@
 "gözetimdir, demokrasinin dayanabileceğinden daha fazla."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "İsimsiz bir ABD hükümeti yetkilisi, 2011’de gazetecilere <a 
href=\"http://";
 "www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-"
@@ -213,10 +254,19 @@
 "aldıklarını göstermiştir."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -235,12 +285,24 @@
 msgstr "Bilgi Bir Kez Toplanırsa Kötüye Kullanılacak"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -273,9 +335,30 @@
 "aksine, bunlar istersek inanabileceğimiz bir masaldır."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -288,7 +371,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -314,6 +397,20 @@
 "biliyor."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -321,7 +418,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -354,9 +451,14 @@
 "tarafından elde edilmesi olasıdır."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Hükûmetler <a href=\"http://www.nytimes.com/2015/06/22/world/europe/";
@@ -397,10 +499,15 @@
 "demokratik özgürlükleri korumak için yeterli olacaklardır."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Bununla birlikte bu tür yasal korumalar güvencesizdir: Yakın tarihin "
 "gösterdiği gibi yürürlükten kaldırılabilir (FISA Değişiklik 
Yasası'nda "
@@ -489,8 +596,20 @@
 "yanı sıra ilgili tüm verileri şirketin sunucusuna teslim etmenizi 
gerektirir."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -674,20 +793,35 @@
 "olarak kullanılabilir durumdadır."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "NSA, PRISM aracılığıyla <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\">birçok büyük İnternet şirketinin veri tabanına "
@@ -739,15 +873,27 @@
 "bahanelerdir."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -763,10 +909,16 @@
 "engellememesine ihtiyacımız var."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Anonim ödemeler için bir başka olası yöntem ise <a 
href=\"https://stallman.";
 "org/articles/anonymous-payments-thru-phones.html\">ön ödemeli telefon "
@@ -914,18 +1066,31 @@
 msgstr "İletişim Dosyaları İçin Çare"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "İnternet servis sağlayıcıları ve telefon şirketleri, 
kullanıcılarının "
 "kişileri (tarama, telefon görüşmeleri vb.) hakkında kapsamlı veri 
tutarlar. "
@@ -953,10 +1118,22 @@
 "verilmemelidir."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1019,6 +1196,20 @@
 "olmayacaktır."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1028,7 +1219,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1045,12 +1236,23 @@
 "\">güç kullanımlarının %60 oranında düştüğü</a> bulundu. ACLU 
bundan yana."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1157,14 +1359,19 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Çevirilerimizde bulmuş olabileceğiniz hataları, aklınızdaki soru ve "
@@ -1178,8 +1385,10 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1206,8 +1415,6 @@
 msgid "Updated:"
 msgstr "Son Güncelleme:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"

Index: surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- surveillance-vs-democracy.uk-diff.html      8 Jun 2021 08:44:42 -0000       
1.26
+++ surveillance-vs-democracy.uk-diff.html      3 Jul 2021 08:01:32 -0000       
1.27
@@ -11,7 +11,8 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.90</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.96 --&gt;
+&lt;!-- This page is derived from 
/server/standards/boilerplate.html</em></ins></span> --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
@@ -33,7 +34,7 @@
 <span class="removed"><del><strong>&lt;p</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;address</em></ins></span> class="byline 
center"&gt;by
-&lt;a href="http://www.stallman.org/"&gt;Richard <span 
class="removed"><del><strong>Stallman&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;</em></ins></span>
+&lt;a <span 
class="removed"><del><strong>href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/address&gt;</em></ins></span>
 
 &lt;!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system --&gt;
@@ -86,14 +87,15 @@
 can't trust nonfree software; the NSA
 &lt;a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;
 and
-even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+even &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</em></ins></span>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+but &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/"&gt;that</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/"&gt;that</em></ins></span>
 won't
 protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</em></ins></span>
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -113,22 +115,23 @@
 
 &lt;p&gt;An unnamed U.S. government official ominously told journalists in
 2011 that
-the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+the &lt;a <span 
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/"&gt;U.S.</em></ins></span>
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;&lt;/a&gt;
-Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+Sometimes &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</em></ins></span>
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
-and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+and &lt;a <span 
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</em></ins></span>
 other companies too&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's &lt;a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+<span 
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</em></ins></span>
 practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
@@ -144,7 +147,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+was &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</em></ins></span>
 to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -160,7 +163,7 @@
 
 &lt;p&gt;In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+agents &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</em></ins></span>
 U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -173,7 +176,7 @@
 with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+to &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</em></ins></span>
 wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
 knows
 of &lt;a <span 
class="removed"><del><strong>href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases"&gt;many</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many</em></ins></span>
@@ -187,7 +190,7 @@
 from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
 &lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
 US&lt;/a&gt;, and most
-recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+recently &lt;a <span 
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</em></ins></span>
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
@@ -199,7 +202,7 @@
 working for hostile states&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Governments can easily use massive surveillance capability
-to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+to &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</em></ins></span>
 democracy directly&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Total surveillance accessible to the state enables the state to
@@ -224,7 +227,8 @@
 &lt;p&gt;However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or &lt;a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -267,7 +271,7 @@
 pertinent data to the company's server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
-too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+too.  &lt;a <span 
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</em></ins></span>
 give out their personal information&lt;/a&gt; except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -364,10 +368,10 @@
 systematically available to the state.&lt;/p&gt;
 
 &lt;p&gt;The NSA, through PRISM,
-has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+has &lt;a <span 
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies"&gt;gotten</em></ins></span>
 into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
 has saved all its phone call records since 1987
-and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+and &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</em></ins></span>
 them available to the DEA&lt;/a&gt; to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -397,17 +401,17 @@
 &lt;p&gt;We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+taxes.)  &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</em></ins></span>
 is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+for &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</em></ins></span>
 cash was first developed in the 1980s&lt;/a&gt;; the GNU software for doing
-this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  Now we 
need
+this is called &lt;a <span 
class="removed"><del><strong>href="http://taler.net/"&gt;GNU</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://taler.net/"&gt;GNU</em></ins></span> 
Taler&lt;/a&gt;.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
 &lt;p&gt;Another possible method for anonymous payments would
-use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+use &lt;a <span 
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html"&gt;prepaid</em></ins></span>
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
 implement.&lt;/p&gt;
 
@@ -484,10 +488,10 @@
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+also &lt;a <span 
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</em></ins></span>
 the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+even &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</em></ins></span>
 the user's body activities&lt;/a&gt;.  It appears that
 the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
 collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
@@ -500,7 +504,7 @@
 &lt;p&gt;This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+the &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</em></ins></span>
 does
 with some or all phone companies&lt;/a&gt;.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -541,7 +545,7 @@
 photographers&lt;/a&gt;.)</em></ins></span>
 One city in California that required police to wear video cameras all
 the time
-found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+found &lt;a <span 
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</em></ins></span>
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
@@ -550,7 +554,7 @@
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</em></ins></span>
 or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -595,7 +599,7 @@
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
-&lt;div id="footer"&gt;
+&lt;div <span 
class="removed"><del><strong>id="footer"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="footer" role="contentinfo"&gt;</em></ins></span>
 &lt;div class="unprintable"&gt;
 
 &lt;p&gt;Please send general FSF &amp; GNU inquiries to
@@ -613,13 +617,13 @@
         to &lt;a href="mailto:web-translators@gnu.org"&gt;
         &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;For information on coordinating and submitting translations of
+        &lt;p&gt;For information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
         README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations
-README&lt;/a&gt; for information on coordinating and submitting translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -640,7 +644,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -650,7 +654,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/06/08 08:44:42 $
+$Date: 2021/07/03 08:01:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- surveillance-vs-democracy.uk.po     30 May 2021 08:31:20 -0000      1.88
+++ surveillance-vs-democracy.uk.po     3 Jul 2021 08:01:32 -0000       1.89
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2018-05-23 21:01+0200\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <>\n"
@@ -34,7 +34,9 @@
 msgstr "Скільки стежень може витримати 
демократія?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Річард Столмен</a>"
 
 #. type: Content of: <blockquote><p><em>
@@ -161,10 +163,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -183,8 +185,17 @@
 "виходимо в Інтернет</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -218,19 +229,34 @@
 "могла його витримати."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "Якась посадова особа адміністрації США 
зловісно заявила журналістам у "
 "2011&nbsp;році, що <a 
href=\"http://www.rcfp.org/browse-media-law-resources/";
@@ -247,10 +273,19 @@
 "verizon-2013-06-07\"> а також від інших компаній</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -270,12 +305,24 @@
 msgstr "Одного разу зібраними відомостями 
будуть зловживати"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -311,9 +358,30 @@
 "можемо вірити, якщо нам до вподоби."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -326,7 +394,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -353,6 +421,20 @@
 "прикладів у США</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -360,7 +442,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -392,9 +474,14 @@
 "worse-than-first.shtml\">зломлювачів, які працюють на 
ворожі держави</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Уряди можуть легко скористатися 
можливістю масового стеження, щоб <a href="
@@ -435,10 +522,15 @@
 "приймуть у повному обсязі і будуть 
дотримуватися завжди і без винятків."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 "Однак такого юридичного захисту не 
достатньо: як показують недавні події, "
 "вони можуть бути відкликані (як Закон про 
поправки в FISA), дія їх може бути "
@@ -528,8 +620,20 @@
 "обчисленнями, це вимагає від вас надання 
всіх оброблюваних даних на сервер."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -715,20 +819,35 @@
 "які збирають компанії, систематично 
доступні державі."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "АНБ за допомогою PRISM <a href=\"https://www.commondreams.org/";
 "headline/2013/08/23-2\"> проникнуло в бази даних 
багатьох великих інтернет-"
@@ -780,15 +899,27 @@
 "її."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -804,10 +935,16 @@
 "підприємств, які займалися б цим, і 
держави, яка б не перешкоджала цьому."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "Інший можливий спосіб анонімних платежів 
&nbsp;&mdash; <a href=\"https://";
 "stallman.org/articles/anonymous-payments-thru-phones.html\"> 
попередньо "
@@ -966,18 +1103,31 @@
 msgstr "Заходи проти комунікаційних досьє"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "Постачальники послуг інтернету і 
телефонні компанії зберігають великі "
 "відомості про контакти своїх 
користувачів (перегляд сторінок Інтернету, 
"
@@ -1006,10 +1156,22 @@
 "порядку."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -1072,6 +1234,20 @@
 "запобіжимо попередньому масовому 
накопиченню досьє цифровими системами."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -1081,7 +1257,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -1099,12 +1275,23 @@
 "сили поліцейськими скоротилося на 60%</a>. ACLU 
підтримує це."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1213,14 +1400,19 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
 "Ми намагалися зробити цей переклад точним 
та якісним, але виключити "
@@ -1233,7 +1425,8 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman"
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 msgstr ""
 "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman (Річард 
Столмен)"
 
@@ -1260,6 +1453,19 @@
 msgstr "Оновлено:"
 
 #~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "Ми намагалися зробити цей переклад 
точним та якісним, але виключити "
+#~ "можливість помилки ми не можемо. 
Надсилайте, будь ласка, свої зауваження "
+#~ "і пропозиції щодо перекладу за адресою <a 
href=\"mailto:web-";
+#~ "translators@gnu.org\">&lt;web-translators@gnu.org&gt;</a>. </"
+#~ "p><p>Відомості з координації та 
пропозицій перекладів наших статей див. у "
+#~ "<a 
href=\"/server/standards/README.translations.html\">&ldquo;Посібнику 
з "
+#~ "перекладу&rdquo;</a>."
+
+#~ msgid ""
 #~ "A version of this article was first published in <a href=\"http://www.";
 #~ "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
 #~ "survive-surveillance/\">Wired</a> in October 2013."

Index: surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- surveillance-vs-democracy.zh-cn.po  3 Jul 2021 07:55:45 -0000       1.61
+++ surveillance-vs-democracy.zh-cn.po  3 Jul 2021 08:01:32 -0000       1.62
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
 "PO-Revision-Date: 2020-12-18 11:47+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -26,7 +27,9 @@
 msgstr "民主能够承受多少监控?"
 
 #. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\";>Richard Stallman</a>"
 msgstr "<a href=\"http://www.stallman.org/\";>Richard Stallman</a> 著"
 
 #. type: Content of: <blockquote><p><em>
@@ -108,6 +111,20 @@
 "平降低到报警者感到安全的水平。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers.  "
+#| "Free software gives us control of our own computers, but <a href=\"http://";
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -115,10 +132,10 @@
 "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
 "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
 "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/";
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/";
 "nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
 "nonfree software to invade our own computers and routers.  Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/";
+"gives us control of our own computers, but <a href=\"https://www.wired.com/";
 "opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
 "the Internet</a>."
 msgstr ""
@@ -134,8 +151,17 @@
 
"opinion/2013/10/149481/\">这并不能在我们上网时保护我们的隐私。</a>。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
+#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers.  "
+#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
+#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
+#| "her.  We need to go further."
 msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
 "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, but "
 "it relies on limiting the government's use of our virtual dossiers.  That "
@@ -165,19 +191,34 @@
 "控。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because &ldquo;We know who you're talking to."
+#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/";
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because &ldquo;We know who you're talking to.&rdquo;</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-";
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-";
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www.";
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
+"lessons-wye-river/\">U.S. would not subpoena reporters because &ldquo;We "
+"know who you're talking to.&rdquo;</a> Sometimes <a href=\"https://www.";
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www.";
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-";
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
 msgstr ""
 "在2011年,某美国政府官员幸灾乐祸地告诉记者<a 
href=\"http://www.rcfp.org/";
 "browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/"
@@ -191,10 +232,19 @@
 "verizon-2013-06-07\">其他公司</a>。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them.  The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">systematic practice of infiltrating peaceful dissident groups</a> on the "
 "pretext that there might be terrorists among them.  The point at which "
 "surveillance is too much is the point at which the state can find who spoke "
@@ -211,12 +261,24 @@
 msgstr "信息,一旦被搜集,就会被滥用"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules.  (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
+#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
+#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
 "That sounds nice, but it won't fix the problem, not even slightly, even "
 "supposing that the government obeys the rules.  (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/";
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/";
 "nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
 "Suspicion of a crime will be grounds for access, so once a whistleblower is "
 "accused of &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will "
@@ -245,9 +307,30 @@
 
"行为</a>。这些制度本来就不是用来认真遵守的;相反,它们就是信不信由ä½
 çš„童话。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
+#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught.  But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
+#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
-"personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
+"personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
 "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
 "surveillance systems to track their lovers</a>&mdash;past, present, or "
 "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says it "
@@ -260,7 +343,7 @@
 "expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-";
 "once-data-shared\">new digital systems</a>.  In 2016, a prosecutor was "
 "accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-";
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\"> wiretap someone who was the object of a romantic "
 "obsession</a>. The AP knows of <a href=\"https://apnews.";
 "com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -280,6 +363,20 @@
 "apnews.com/699236946e3140659fff8a2362e16f43\">更多美国的å…
¶ä»–案例</a>。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited.  Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -287,7 +384,7 @@
 "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-";
 "personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
 "href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-";
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-";
 "a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
 "jail-1.4495021\">Turkey</a>.  (Turkey's confusion about who had really used "
 "the Bylock program only exacerbated the basic deliberate injustice of "
@@ -315,9 +412,14 @@
 
"revealed-even-worse-than-first.shtml\">为敌对国家工作的骇客获得</a>。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "政府可以轻易使用其强大的监控能力<a 
href=\"http://www.nytimes.com/2015/06/22/";
@@ -353,10 +455,15 @@
 "护民主自由&mdash;&mdash;如果完全采纳并永无例外地执行。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgstr ""
 
"然而,这种法律保护是不确定的:正如当代历史展示的,法律会被废除(象FISA修正"
 "案)、终止或<a 
href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>忽略"
@@ -433,8 +540,20 @@
 "a>;这也是把计算控制交给了别人,因为这要求你把å…
¨éƒ¨ç›¸å…³æ•°æ®äº¤ç»™æœåŠ¡å™¨ã€‚"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts.  Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper.  "
+#| "Better yet, don't be used by Facebook at all.  Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
 msgid ""
-"Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
+"Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Don't give out their personal information</a> "
 "except how to contact them, and never give any web site your list of email "
@@ -592,20 +711,35 @@
 "地获取由公司收集的数据的。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place.  In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>.  AT&amp;T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-";
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request.  Strictly speaking, the U.S.  government does not "
-"possess that data, but in practical terms it may as well possess it.  Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-";
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place.  In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>.  AT&amp;T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request.  Strictly speaking, the U.S.  government does not possess that "
+"data, but in practical terms it may as well possess it.  Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place.  In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
 msgstr ""
 "NSA,通过PRISM<sup><a href=\"#TransNote7\">7</a></sup>,可以<a href="
 "\"https://www.commondreams.org/headline/2013/08/23-2\";>进å…
¥è®¸å¤šå¤§åž‹ç½‘络集团的"
@@ -647,15 +781,27 @@
 "私政策&rdquo;只是违反隐私的借口而非保护隐私的承诺。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
+#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
+#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
-"payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-";
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin.  However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.";
+"payee dodge taxes.)  <a href=\"https://www.wired.com/opinion/2013/05/lets-";
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin.  However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.";
 "html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\";>GNU Taler</a>.  Now "
+"for doing this is called <a href=\"https://taler.net/\";>GNU Taler</a>.  Now "
 "we need only suitable business arrangements, and for the state not to "
 "obstruct them."
 msgstr ""
@@ -668,10 +814,16 @@
 "要合适的商业规划,以及政府不要阻挠这些规划。"
 
 #. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://";
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>.  It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
+#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
+"less convenient, but very easy to implement."
 msgstr ""
 "另一个匿名付款的可能方法是使用<a 
href=\"https://stallman.org/articles/";
 
"anonymous-payments-thru-phones.html\">预付款电话卡</a>。它虽然不太方便,但是"
@@ -798,18 +950,31 @@
 msgstr "针对通讯档案的解药"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
+#| "protection-malte-spitz\">record the user's physical location</a>.  They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&amp;"
+#| "T.  Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/";
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>.  It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-";
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
 msgid ""
 "Internet service providers and telephone companies keep extensive data on "
 "their users' contacts (browsing, phone calls, etc).  With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-";
-"protection-malte-spitz\">record the user's physical location</a>.  They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&amp;T.  "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-";
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>.  It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-";
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www.";
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>.  They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&amp;T.  Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-";
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>.  It appears that the <a href=\"https://www.";
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
 msgstr ""
 "网络服务商和电话公司保留å…
¶ç”¨æˆ·çš„大量数据(浏览记录、通话记录等等)。对移动电"
 "话用户,他们还会<a 
href=\"http://www.zeit.de/digital/datenschutz/2011-03/";
@@ -833,10 +998,22 @@
 "令的对象。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>.  We would have to rely on prohibiting "
+#| "that by law.  However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice.  In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
 msgid ""
 "This solution is not entirely satisfactory, because it won't physically stop "
 "the government from collecting all the information immediately as it is "
-"generated&mdash;which is what the <a href=\"http://www.guardian.co.uk/";
+"generated&mdash;which is what the <a href=\"https://www.guardian.co.uk/";
 "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
 "some or all phone companies</a>.  We would have to rely on prohibiting that "
 "by law.  However, that would be better than the current situation, where the "
@@ -890,6 +1067,20 @@
 "警者就不太可能。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored.  (In fact, police have "
+#| "their own jargon term for perjury, &ldquo;<a href=\"https://en.wikipedia.";
+#| "org/w/index.php?title=Police_perjury&amp;oldid=552608302\">testilying</a>,"
+#| "&rdquo; since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://";
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.)  One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-";
+#| "surveillance-police-edition\">their use of force fell by 60%</a>.  The "
+#| "ACLU is in favor of this."
 msgid ""
 "Individuals with special state-granted power, such as police, forfeit their "
 "right to privacy and must be monitored.  (In fact, police have their own "
@@ -899,7 +1090,7 @@
 "\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.";
 "com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
 "\"> photographers</a>.)  One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-";
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-";
 "drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
 "fell by 60%</a>.  The ACLU is in favor of this."
 msgstr ""
@@ -914,12 +1105,23 @@
 "警察使用武力的现象减少60%</a>。ACLU(美国å…
¬æ°‘自由联盟)很支持这个做法。"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action.";
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>.  It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\";>DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being.  "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
 msgid ""
 "<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen.";
 "org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
 "people, and not entitled to human rights</a>.  It is legitimate to require "
 "businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://";
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://";
 "DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
 "society, to whatever level is needed for public well-being.  The danger of "
 "these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1028,9 +1230,7 @@
 "系方法</a>联系自由软件基金会(FSF)。有关失效链接或å…
¶ä»–错误和建议,请发送邮件"
 "到<a href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu.org&gt;</a>。"
 
-#
-#
-#
+# TODO: submitting -> contributing.
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -1038,22 +1238,29 @@
 #.         Please send your comments and general suggestions in this regard
 #.         to <a href="mailto:web-translators@gnu.org";>
 #.         &lt;web-translators@gnu.org&gt;</a>.</p>
-#.         <p>For information on coordinating and submitting translations of
+#.         <p>For information on coordinating and contributing translations of
 #.         our web pages, see <a
 #.         href="/server/standards/README.translations.html">Translations
 #.         README</a>. 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
 msgid ""
 "Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
 "translations of this article."
 msgstr ""
-"若您想翻译本文,请参看<a 
href=\"/server/standards/README.translations.html\">"
-"翻译须知</a>获取有关协调和提交翻译的相关事项。"
+"请参考 <a 
href=\"/server/standards/README.translations.html\">翻译说明</a> 了"
+"解有关协调和提交文章翻译的信息。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1077,8 +1284,17 @@
 msgid "Updated:"
 msgstr "最后更新:"
 
-#. type: Content of: <div><p>
-msgid ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#
+#
+#
+#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "若您想翻译本文,请参看<a 
href=\"/server/standards/README.translations.html"
+#~ "\">翻译须知</a>获取有关协调和提交翻译的相关事项。"
+
+#~ msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]