[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po surveillance-vs-democracy.es....
From: |
GNUN |
Subject: |
www/philosophy/po surveillance-vs-democracy.es.... |
Date: |
Sat, 3 Jul 2021 04:01:32 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/03 04:01:32
Modified files:
philosophy/po : surveillance-vs-democracy.es.po
surveillance-vs-democracy.fr.po
surveillance-vs-democracy.it.po
surveillance-vs-democracy.ja.po
surveillance-vs-democracy.lt-diff.html
surveillance-vs-democracy.lt.po
surveillance-vs-democracy.ml.po
surveillance-vs-democracy.nl.po
surveillance-vs-democracy.pot
surveillance-vs-democracy.pt-br.po
surveillance-vs-democracy.ru.po
surveillance-vs-democracy.sq.po
surveillance-vs-democracy.tr.po
surveillance-vs-democracy.uk-diff.html
surveillance-vs-democracy.uk.po
surveillance-vs-democracy.zh-cn.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.es.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.lt.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ml.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pot?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.pt-br.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ru.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.sq.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.61&r2=1.62
Patches:
Index: surveillance-vs-democracy.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.es.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- surveillance-vs-democracy.es.po 3 Jul 2021 07:55:45 -0000 1.116
+++ surveillance-vs-democracy.es.po 3 Jul 2021 08:01:32 -0000 1.117
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2020-12-18 10:53+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -32,7 +33,10 @@
msgstr "¿Cuánta vigilancia puede soportar la democracia?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "por <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -129,6 +133,32 @@
"que no corren peligro."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -136,10 +166,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -159,8 +189,24 @@
"privacidad una vez que pongamos los pies en Internet</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -194,19 +240,48 @@
"vigilancia que la democracia no puede soportar."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Un funcionario no identificado del gobierno de los EE. UU. en 2011 hizo "
"a los periodistas la inquietante declaración de que <a href=\"http://www."
@@ -225,10 +300,27 @@
"verizon-2013-06-07\">otras empresas</a>."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -250,12 +342,34 @@
"Una vez que se haya obtenido la información, será usada incorrectamente"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -291,9 +405,50 @@
"creer si asà lo deseamos."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -306,7 +461,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -334,6 +489,31 @@
"a>."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -341,7 +521,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -376,9 +556,17 @@
"shtml\">informáticos al servicio de paÃses enemigos</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Los gobiernos pueden fácilmente utilizar la capacidad de vigilancia masiva "
@@ -421,10 +609,18 @@
"se adopten completamente y se apliquen sin excepción para siempre."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"No obstante, tales protecciones legales son precarias: como lo demuestra la "
"historia reciente, pueden ser revocadas (como en el caso de la Ley de "
@@ -518,8 +714,29 @@
"enviar todos los datos pertinentes a la empresa que gestoina el servidor."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -714,20 +931,49 @@
"a los datos recolectados por las empresas."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"A través del programa PRISM, la NSA <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">ha accedido a las bases de datos de muchas grandes "
@@ -782,15 +1028,38 @@
"para violar la privacidad que compromisos para defenderla."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -806,10 +1075,20 @@
"adecuados y que el Estado no los obstruya."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Otro método posible para efectuar pagos anónimos es el uso de <a href="
"\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
@@ -968,18 +1247,42 @@
msgstr "Remedio para los expedientes de comunicaciones"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Los proveedores del servicio de Internet <abbr title=\"Internet Service "
"Provider\">ISP</abbr> y las compañÃas telefónicas conservan mucha "
@@ -1009,10 +1312,32 @@
"vigilar a una cierta persona."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1082,6 +1407,30 @@
"priori</i>."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1091,7 +1440,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1110,12 +1459,33 @@
"está a favor de esto."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1223,7 +1593,6 @@
"proponer otras correcciones o sugerencias, dirÃjase a <a href=\"mailto:"
"webmasters@gnu.org\"><webmasters@gnu.org></a>."
-#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -1231,14 +1600,14 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"El equipo de traductores al español se esfuerza por ofrecer traducciones "
@@ -1250,8 +1619,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1274,8 +1645,6 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- surveillance-vs-democracy.fr.po 3 Jul 2021 07:55:45 -0000 1.134
+++ surveillance-vs-democracy.fr.po 3 Jul 2021 08:01:32 -0000 1.135
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2020-12-18 19:03+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -31,7 +32,10 @@
msgstr "Quel niveau de surveillance la démocratie peut-elle endurer ?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "par <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -129,6 +133,32 @@
"d'alerte se sentent en sécurité."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -136,10 +166,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -158,8 +188,24 @@
"où nous mettons les pieds sur Internet</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -194,19 +240,48 @@
"delà de ce que peut supporter la démocratie."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"En 2011, un représentant anonyme du gouvernement américain a fait une "
"déclaration inquiétante à des journalistes, à savoir que <a
href=\"http://"
@@ -224,10 +299,27 @@
"les relevés téléphoniques de chaque résident."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -248,12 +340,34 @@
msgstr "L'information, une fois collectée, sera utilisée à de mauvaises
fins"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -291,9 +405,50 @@
"un conte de fées que nous pouvons croire si cela nous chante."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -306,7 +461,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -334,6 +489,31 @@
"cas aux Ãtats-Unis</a>."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -341,7 +521,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -376,9 +556,17 @@
"revealed-even-worse-than-first.shtml\">au service d'Ãtats hostiles</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Les gouvernements peuvent facilement faire usage de leur énorme capacité de
"
@@ -422,10 +610,18 @@
"exception, Ã tout jamais."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Toutefois, ces protections juridiques sont précaires : comme nous l'ont "
"montré les récents événements, ils peuvent être abrogés (comme dans la
loi "
@@ -520,8 +716,29 @@
"fournir toutes les données pertinentes au serveur de l'entreprise."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -717,20 +934,49 @@
"de l'Ãtat."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"Depuis PRISM, <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">la NSA a un accès direct aux bases de données de "
@@ -787,15 +1033,38 @@
"violer celle-ci qu'un engagement à la respecter."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -812,10 +1081,20 @@
"commerciaux adaptés et que l'Ãtat n'y fasse pas obstruction."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Une autre méthode possible de paiement anonyme fait usage de <a href="
"\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">cartes "
@@ -973,18 +1252,42 @@
msgstr "Remède aux dossiers sur les communications"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Les fournisseurs de services Internet et les compagnies de téléphone "
"enregistrent une masse de données sur les contacts de leurs utilisateurs "
@@ -1015,10 +1318,32 @@
"personne ou un groupe en particulier."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1087,6 +1412,30 @@
"numériques d'accumuler d'énormes dossiers avant les faits."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1096,7 +1445,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1117,12 +1466,33 @@
"près de 60 %</a>. L'ACLU y est favorable."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1260,14 +1630,14 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Merci d'adresser vos commentaires sur les pages en français à <<a href="
@@ -1278,8 +1648,10 @@
"traduction</a> les infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1306,8 +1678,6 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- surveillance-vs-democracy.it.po 3 Jul 2021 07:55:45 -0000 1.128
+++ surveillance-vs-democracy.it.po 3 Jul 2021 08:01:32 -0000 1.129
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2021-02-01 07:00-0500\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Italian\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"X-Generator: Poedit 2.2\n"
#. type: Content of: <title>
@@ -33,7 +34,10 @@
# type: Content of: <p>
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "di <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -126,6 +130,32 @@
"scoperti."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -133,10 +163,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -154,8 +184,24 @@
"quando mettiamo piede su Internet</a>. "
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -188,19 +234,48 @@
"ammissibile in democrazia."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Nel 2011 un anonimo funzionario statale americano ammonì i giornalisti che "
"<a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-"
@@ -217,10 +292,27 @@
"a>."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -239,12 +331,34 @@
msgstr "Una volta raccolte, le informazioni saranno usate in modi impropri"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -277,9 +391,50 @@
"rispettate, sono più simili a una favola a cui possiamo credere se vogliamo."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -292,7 +447,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -319,6 +474,31 @@
"Stati Uniti."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -326,7 +506,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -358,9 +538,17 @@
"revealed-even-worse-than-first.shtml\">lavorano per potenze nemiche</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"I governi possono facilmente usare la sorveglianza di massa per <a href="
@@ -401,10 +589,18 @@
"fatti rispettare senza eccezioni per sempre."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Tuttavia queste garanzie legali sono precarie: come dimostra la storia "
"recente, esse possono venir abrogate (come nel caso del FISA Amendment Act), "
@@ -496,8 +692,29 @@
"esterna tutti i relativi dati."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -685,20 +902,49 @@
"disposizione dello stato."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"Grazie a PRISM, la NSA <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">si è introdotta nei database</a> di molte grandi "
@@ -750,15 +996,38 @@
"un impegno a rispettarla."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -774,10 +1043,20 @@
"dei modelli di business adatti, che non vengano intralciati dallo stato."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Un altro modo possibile di effettuare pagamenti anonimi sarebbe con <a href="
"\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">schede "
@@ -929,18 +1208,42 @@
msgstr "Un rimedio ai dossier sulle comunicazioni"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"I fornitori di servizi Internet e le compagnie telefoniche conservano grandi "
"quantità di dati sui contatti dei loro utenti (cronologia di navigazione, "
@@ -969,10 +1272,32 @@
"mandato del tribunale a sorvegliare un dato soggetto."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1038,6 +1363,30 @@
"digitali accumulino immensi dossier prima del fatto."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1047,7 +1396,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1066,12 +1415,33 @@
"provvedimento."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1183,14 +1553,14 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Le traduzioni italiane sono effettuate ponendo la massima attenzione ai "
@@ -1204,8 +1574,10 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1229,8 +1601,6 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- surveillance-vs-democracy.ja.po 3 Jul 2021 07:55:45 -0000 1.78
+++ surveillance-vs-democracy.ja.po 3 Jul 2021 08:01:32 -0000 1.79
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2021-04-05 16:46+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -29,7 +30,9 @@
msgstr "æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a
href=\"http://www.stallman.org/\">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è"
#. type: Content of: <blockquote><p><em>
@@ -117,6 +120,20 @@
"å®å
¨ã
ã¨ãããç¹ã¾ã§ç£è¦ãåæ¸ããªããã°ãªãã¾ããã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -124,10 +141,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -146,8 +163,17 @@
"ã)ã§ã¯ããããã¡ã®ãã©ã¤ãã·ã¼ãå®ããªãã§ããã</a>ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -179,19 +205,34 @@
"ã§ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"å¿åã®åè¡å½æ¿åºã®å
¬åå¡ã¯ä¸æ°å³ã«2011å¹´ãã¸ã£ã¼ããªã¹ãã«ããè¨ãã¾ããã<a
"
"href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-"
@@ -207,10 +248,19 @@
"ã¦ãããã¨ããã¹ãã¼ãã³ã¯ããããã¡ã«ç¤ºããã®ã§ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -229,12 +279,24 @@
msgstr "æ
å ±ã¯ä¸åº¦éç©ãããã°æªç¨ããã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -266,9 +328,30 @@
"ãããã¨ã話ã®ãããªãã®ã§ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -281,7 +364,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -305,6 +388,20 @@
"com/699236946e3140659fff8a2362e16f43\">åè¡å½ã®å¤ãã®äºä¾</a>ãããã¾ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -312,7 +409,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -343,9 +440,14 @@
"shtml\">æµå¯¾çãªå½ã®ããã«åãã¦ããã¯ã©ãã«ã¼</a>ããç¥ãã¾ããã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"æ¿åºã¯å®¹æã«å¤§éç£è¦ã®æ©æ§ã使ã£ã¦<a
href=\"http://www.nytimes."
@@ -383,10 +485,15 @@
"ãããããããå®å
¨ã«æ¡æãããä¾å¤ãªãã«æ°¸ä¹
ã«å®æ½ãããã®ã§ããã°ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"ãããããããã£ãæ³çãªä¿è·ã¯ãã¦ã«ãªãã¾ãã:
æè¿ã®æ´å²ã¯ãããã¯å»æ¢(å¤å½"
"è«å
±æ´»å調æ»æ³ä¿®æ£æ³ã«è¦ãããããã«)ãåæ¢ããããã¯<a
href=\"http://www."
@@ -473,8 +580,20 @@
"ãã¯è¦æ±ããã®ã§ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -649,20 +768,35 @@
"ç¨å¯è½ã ããã§ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"PRISMãéãã¦ãNSAã¯<a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">ããããã®å¤§ããªã¤ã³ã¿ã¼ãããä¼æ¥ã®ãã¼ã¿ãã¼ã¹ã«ä¹"
@@ -712,15 +846,27 @@
"ã¡ã¯ããç¥ã£ã¦ãã¾ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -735,10 +881,16 @@
"åã決ããå¿
è¦ãªã
ãã§ãå½å®¶ã¯ããã妨害ããªããã°ããã®ã§ãã"
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"å¿åã®æ¯æãã®ããä¸ã¤ã®ããããããæ¹ã¯ã<a
href=\"https://stallman.org/"
"articles/anonymous-payments-thru-phones.html\">é»è©±ã®ããªãã¤ãã«ã¼ã</a>ã使"
@@ -882,18 +1034,31 @@
msgstr "éä¿¡ã®è¨é²ã®å¯¾ç"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"ã¤ã³ã¿ã¼ããããµã¼ãã¹ãããã¤ãã¨é»è©±ä¼ç¤¾ã¯ã¦ã¼ã¶ã¨ã®å¥ç´ã§å¤§éã®ãã¼ã¿(ãã©"
"ã¦ãºãé»è©±ä¼è©±ããã®ã»ã)ãä¿ç®¡ãã¦ãã¾ããæºå¸¯é»è©±ã§ã¯ã<a
href=\"http://"
@@ -919,10 +1084,22 @@
"ã¹ãã§ã¯ããã¾ããã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -984,6 +1161,20 @@
"ã¹ãã ãç¦æ¢ããã°ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -993,7 +1184,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1010,12 +1201,23 @@
"ã¯ããã好ã¾ããèãã¦ãã¾ãã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1121,25 +1323,27 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"æ£ç¢ºã§è¯ãå質ã®ç¿»è¨³ãæä¾ããããåªåãã¦ãã¾ãããä¸å®å
¨ãªå ´åããããã¨æ"
"ãã¾ãã翻訳ã«é¢ããã³ã¡ã³ãã¨ææ¡ã¯ã<a
href=\"mailto:web-translators@gnu."
"org\"><web-translators@gnu.org></a>ã«ãããããã¾ãã</p><p>ããããã¡"
-"ã®ã¦ã§ããã¼ã¸ã®ç¿»è¨³ã®èª¿æ´ã¨æåºã«ã¤ãã¦ã¯ã<a
href=\"/server/standards/"
+"ã®ã¦ã§ããã¼ã¸ã®ç¿»è¨³ã®èª¿æ´ã¨è²¢ç®ã«ã¤ãã¦ã¯ã<a
href=\"/server/standards/"
"README.translations.html\">翻訳 README</a>ãã覧ãã ããã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1161,11 +1365,9 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
#~ msgid ""
#~ "A version of this article was first published in <a href=\"http://www."
Index: surveillance-vs-democracy.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- surveillance-vs-democracy.lt-diff.html 30 May 2021 19:32:32 -0000
1.42
+++ surveillance-vs-democracy.lt-diff.html 3 Jul 2021 08:01:32 -0000
1.43
@@ -11,7 +11,8 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.90</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.96 -->
+<!-- This page is derived from
/server/standards/boilerplate.html</em></ins></span> -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
@@ -32,18 +33,18 @@
<span class="removed"><del><strong><p>by</strong></del></span>
<span class="inserted"><ins><em><address class="byline
center">by</em></ins></span>
-<a href="http://www.stallman.org/">Richard <span
class="removed"><del><strong>Stallman</a></p>
+<a <span
class="removed"><del><strong>href="http://www.stallman.org/">Richard
Stallman</a></p>
-<blockquote><p>A</strong></del></span> <span
class="inserted"><ins><em>Stallman</a></address>
+<blockquote><p>A</strong></del></span> <span
class="inserted"><ins><em>href="https://www.stallman.org/">Richard
Stallman</a></address>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
<blockquote class="center"><p><em>A</em></ins></span>
version of this article was first published in <span
class="removed"><del><strong><a
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a></strong></del></span>
-<span class="inserted"><ins><em><cite>Wired</cite> in
October 2013.<br />
+<span
class="inserted"><ins><em><cite>Wired</cite></em></ins></span> in
<span class="removed"><del><strong>October
2013.</p></blockquote></strong></del></span> <span
class="inserted"><ins><em>October 2013.<br />
Also consider reading “<a
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
radical proposal to keep your personal data safe</a>,” published in
-<cite>The Guardian</cite></em></ins></span> in <span
class="removed"><del><strong>October
2013.</p></blockquote></strong></del></span> <span
class="inserted"><ins><em>April 2018.</em></p></blockquote>
+<cite>The Guardian</cite> in
April 2018.</em></p></blockquote>
<div class="article">
@@ -87,14 +88,15 @@
can't trust nonfree software; the NSA
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">uses</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a></em></ins></span>
and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+even <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></em></ins></span>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+but <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/">that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/">that</em></ins></span>
won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+<span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</em></ins></span>
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -116,22 +118,23 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+the <a <span
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.</em></ins></span>
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+Sometimes <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</em></ins></span>
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from</em></ins></span>
Verizon</a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+and <a <span
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</em></ins></span>
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+<span
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</em></ins></span>
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
@@ -151,7 +154,7 @@
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+was <a <span
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</em></ins></span>
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -167,7 +170,7 @@
<p>In</em></ins></span> addition, the state's surveillance staff will
misuse the data
for personal reasons. Some NSA
-agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+agents <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</em></ins></span>
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -181,7 +184,7 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+to <a
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
@@ -197,7 +200,7 @@
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
<span class="removed"><del><strong>US
</a>.</p></strong></del></span>
<span class="inserted"><ins><em>US</a>, and most
-recently <a
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
+recently <a
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
@@ -209,7 +212,7 @@
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+to <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</em></ins></span>
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -236,7 +239,8 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+<span
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></em></ins></span>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -284,7 +288,7 @@
pertinent data to the <span
class="inserted"><ins><em>company's</em></ins></span> server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+too. <a <span
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</strong></del></span>
<span
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</em></ins></span>
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -388,10 +392,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+has <a <span
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2">gotten</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten</em></ins></span>
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+and <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</em></ins></span>
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>it. Some companies are praised
@@ -421,17 +425,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want <span
class="inserted"><ins><em>to
help</em></ins></span> the payee <span
class="removed"><del><strong>to</strong></del></span> dodge
-taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+taxes.) <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</em></ins></span>
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+for <a <span
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</em></ins></span>
cash was first developed in the 1980s</a>; <span
class="inserted"><ins><em>the GNU software for doing
-this is called <a href="http://taler.net/">GNU Taler</a>.
Now</em></ins></span> we need
+this is called <a href="https://taler.net/">GNU Taler</a>.
Now</em></ins></span> we need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<span class="inserted"><ins><em><p>Another possible method for anonymous
payments would
-use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
phone cards</a>. It is less convenient, but very easy to
implement.</p></em></ins></span>
@@ -512,10 +516,10 @@
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+also <a <span
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</em></ins></span>
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+even <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</em></ins></span>
the user's body activities</a>. It appears that
the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
collects cell phone location data</a> in bulk.</p>
@@ -528,7 +532,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+the <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</em></ins></span>
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -571,7 +575,7 @@
photographers</a>.)</em></ins></span>
One city in California that required police to wear video cameras all
the time
-found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+found <a <span
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</em></ins></span>
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
@@ -580,7 +584,7 @@
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">DRM</a>)</strong></del></span>
<span
class="inserted"><ins><em>href="https://DefectiveByDesign.org">DRM</a>)</em></ins></span>
or political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -627,7 +631,7 @@
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div <span
class="removed"><del><strong>id="footer"></strong></del></span> <span
class="inserted"><ins><em>id="footer" role="contentinfo"></em></ins></span>
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -645,13 +649,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations
of this article.</p>
</div>
@@ -672,7 +676,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span>
Richard Stallman</p>
+<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020,
2021</em></ins></span> Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -682,7 +686,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/30 19:32:32 $
+$Date: 2021/07/03 08:01:32 $
<!-- timestamp end -->
</p>
</div>
Index: surveillance-vs-democracy.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.lt.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- surveillance-vs-democracy.lt.po 30 May 2021 19:32:32 -0000 1.44
+++ surveillance-vs-democracy.lt.po 3 Jul 2021 08:01:32 -0000 1.45
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2015-12-16 13:11+0100\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -31,7 +31,10 @@
msgstr "Kiek daug sekimo demokratija gali atlaikyti?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "pagal <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -164,11 +167,11 @@
# | surveillance. We can't trust nonfree software; the NSA <a
# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
# | and even <a
-# |
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
# | security weaknesses in nonfree software to invade our own computers and
# | routers. Free software gives us control of our own computers, but <a
-# | href=\"http://www.wired.com/opinion/2013/10/149481/\">that won't protect
-# | our privacy once we set foot on the Internet</a>.
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
#, fuzzy
#| msgid ""
#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
@@ -190,10 +193,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -212,8 +215,24 @@
"internetÄ
</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -246,19 +265,48 @@
"žurnalistu yra per daug sekimo – per daug iÅ¡tverti demokratijai."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Neįvardintas JAV vyriausybÄs atstovas 2011 m. žurnalistams
grÄsmingai "
"praneÅ¡Ä, kad <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
@@ -274,10 +322,27 @@
"verizon-2013-06-07\">iš kitų kompanijų irgi</a>."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -297,12 +362,34 @@
msgstr "Informacija, surinkus, bus netinkamai panaudota"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -331,7 +418,7 @@
#. type: Content of: <div><div><p>
# | In addition, the state's surveillance staff will misuse the data for
# | personal reasons. Some NSA agents <a
-# |
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
# | U.S. surveillance systems to track their lovers</a>—past, present,
# | or wished-for—in a practice called “LOVEINT.” The NSA
# | says it has caught and punished this a few times; we don't know how many
@@ -344,7 +431,7 @@
# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
# | signatures to get authorization to <a
-# |
href=\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# |
href=\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
# | wiretap someone who was the object of a romantic obsession</a>. The AP
# | knows of <a
# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
@@ -365,7 +452,7 @@
#| "”"
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -378,7 +465,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -406,7 +493,7 @@
# |
{+href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,+}
# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
# | [-US </a>.-] {+US</a>, and most recently <a
-# |
href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# |
href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
# | (Turkey's confusion about who had really used the Bylock program only
# | exacerbated the basic deliberate injustice of arbitrarily punishing people
# | for having used it.)+}
@@ -426,7 +513,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -455,9 +542,17 @@
"valstybÄms</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"VyriausybÄs gali lengvai naudoti masinio sekimo gebÄjimÄ
<a href=\"http://"
@@ -497,10 +592,18 @@
"be iÅ¡imÄių privalomai užtikrinti amžinai."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"TaÄiau, tokios teisinÄs apsaugos yra nepatikimos: pagal nesenÄ
istorijÄ
,
jos "
"gali bÅ«ti atÅ¡auktos (kaip pagal FISA pataisų aktÄ
), atidÄtos arba <a
href="
@@ -609,7 +712,7 @@
#. type: Content of: <div><div><p>
# | Protect your friends' and acquaintances' privacy, too. <a
-# |
href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
# | give out their personal information</a> except how to contact them, and
# | never give any web site your list of email or phone contacts. Don't tell
# | a company such as Facebook anything about your friends that they might not
@@ -630,7 +733,7 @@
#| "going to give yours, since they pressure other people to surrender their "
#| "privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -870,10 +973,11 @@
#. type: Content of: <div><div><p>
# | The NSA, through PRISM, has <a
-# | href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten into
-# | the databases of many large Internet corporations</a>. AT&T has saved
-# | all its phone call records since 1987 and <a
-# |
href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
# | them available to the DEA</a> to search on request. Strictly speaking,
# | the U.S. government does not possess that data, but in practical terms it
# | may as well possess it. {+Some companies are praised for <a
@@ -894,18 +998,18 @@
#| "it."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"NSA, per PRISM, <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">pateko į daugelio didelių interneto korporacijų "
@@ -956,14 +1060,14 @@
# | We could correct both problems by adopting a system of anonymous
# | payments—anonymous for the payer, that is. (We don't want {+to
# | help+} the payee [-to-] dodge taxes.) <a
-# |
href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
# | is not anonymous</a>, though there are efforts to develop ways to pay
# | anonymously with Bitcoin. However, technology for <a
-# | href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
# | cash was first developed in the 1980s</a>; {+the GNU software for doing
-# | this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now+} we need
-# | only suitable business arrangements, and for the state not to obstruct
-# | them.
+# | this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now+} we
+# | need only suitable business arrangements, and for the state not to
+# | obstruct them.
#, fuzzy
#| msgid ""
#| "We could correct both problems by adopting a system of anonymous "
@@ -978,12 +1082,12 @@
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -998,9 +1102,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
#. type: Content of: <div><div><p>
@@ -1169,18 +1273,42 @@
msgstr "Komunikacinių asmeninių įrašų ištaisymas"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Prieigos prie interneto tiekÄjai ir telefoninio ryÅ¡io kompanijos laiko "
"išsamius savo naudotojų kontaktų duomenis (naršymas, telefoniniai
skambuÄiai "
@@ -1207,10 +1335,32 @@
"informacijÄ
, nesant teismo sprendimo sekti tam tikrÄ
pusÄ."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1276,6 +1426,30 @@
"skaitmeninÄms sistemoms masiÅ¡kai kaupti asmeninius įraÅ¡us."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1285,7 +1459,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1304,12 +1478,33 @@
"pirmenybÄ."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1416,6 +1611,7 @@
"pasiūlymai gali būti atsiųsti į <a
href=\"mailto:webmasters@gnu.org\"><"
"webmasters@gnu.org></a>."
+# TODO: submitting -> contributing.
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -1423,14 +1619,20 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Mes dirbame sunkiai ir labai stengiamÄs, kad pateiktume tikslius, geros "
@@ -1442,11 +1644,12 @@
"PERSKAITYKITEMANE</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020+} Richard
-# | Stallman
+# | Copyright © [-2015-] {+2015, 2016, 2017, 2018, 2019, 2020, 2021+}
+# | Richard Stallman
#, fuzzy
#| msgid "Copyright © 2015 Richard Stallman"
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
msgstr "Copyright © 2015 Richard Stallman"
#. type: Content of: <div><p>
@@ -1470,6 +1673,20 @@
msgstr "Atnaujinta:"
#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "Mes dirbame sunkiai ir labai stengiamÄs, kad pateiktume tikslius, geros "
+#~ "kokybÄs vertimus. TaÄiau mes nesame iÅ¡imtys netobulumui. PraÅ¡ome "
+#~ "siųskite savo komentarus ir bendrus pasiūlymus šia prasme į <a href="
+#~ "\"mailto:web-translators@gnu.org\"><web-translators@gnu.org></a>.</"
+#~ "p>\n"
+#~ "<p>MÅ«sų tinklapių vertimų koordinavimo ir pateikimo informacijÄ
"
+#~ "pamatykite <a href=\"/server/standards/README.translations.html\">Vertimų
"
+#~ "PERSKAITYKITEMANE</a>."
+
+#~ msgid ""
#~ "A version of this article was first published in <a href=\"http://www."
#~ "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
#~ "survive-surveillance/\">Wired</a> in October 2013."
Index: surveillance-vs-democracy.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ml.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- surveillance-vs-democracy.ml.po 3 Jul 2021 07:55:45 -0000 1.18
+++ surveillance-vs-democracy.ml.po 3 Jul 2021 08:01:32 -0000 1.19
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2021-06-01 17:22+0200\n"
"Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
"Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"Plural-Forms: nplurals=2; plural=n != 1;\n"
"X-Generator: Lokalize 20.12.0\n"
@@ -30,7 +31,10 @@
msgstr "à´à´¨à´¾à´§à´¿à´ªà´¤àµà´¯à´¤àµà´¤à´¿à´¨àµàµ
à´à´¤àµà´°à´¤àµà´¤àµà´³à´ സർവàµà´¯à´¿à´²àµ»à´¸à´¿à´¨àµ
à´àµà´±àµà´àµà´àµà´µà´¾àµ» à´à´´à´¿à´¯àµà´?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">റിà´àµà´à´¾àµ¼à´¡àµ
à´¸àµà´±àµà´±à´¾àµ¾à´®à´¾àµ»</a> à´à´´àµà´¤à´¿à´¯à´¤àµàµ"
#. type: Content of: <blockquote><p><em>
@@ -123,6 +127,32 @@
"à´
റിയàµà´¨àµà´¨à´¤àµà´µà´¿à´àµà´¯à´¾à´£àµ à´
à´¤àµà´¤à´¿à´²àµà´àµà´àµàµ സർവàµà´¯à´¿à´²àµ»à´¸à´¿à´¨àµ
à´àµà´°àµà´àµà´à´£à´."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -130,10 +160,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -152,8 +182,24 @@
"à´¸àµà´µà´à´¾à´°àµà´¯à´¤à´¯àµ
à´¸à´à´°à´àµà´·à´¿à´àµà´à´¿à´²àµà´²</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -187,19 +233,48 @@
"à´à´¨à´¾à´§à´¿à´ªà´¤àµà´¯à´¤àµà´¤à´¿à´¨àµ
താà´àµà´à´¾à´µàµà´¨àµà´¨à´¤à´¿à´²àµà´®à´ªàµà´ªàµà´±à´."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"<a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-"
"media-and-law-summer-2011/lessons-wye-river\">റിപàµà´ªàµàµ¼à´àµà´àµ¼à´®à´¾à´°àµà´àµ
à´àµà´à´¤à´¿à´¯à´¿àµ½ "
@@ -216,10 +291,27 @@
"à´àµà´à´¤à´¿à´¯à´¿àµ½ ഹാà´à´°à´¾à´àµà´à´ªàµà´ªàµà´à´¾àµ» à´
വർ à´à´¤àµà´¤à´°à´µà´¿à´à´¾à´±àµà´£àµà´àµà´¨àµà´¨àµ
à´¸àµà´¨àµà´¡àµ» നമàµà´àµà´àµ
à´à´¾à´£à´¿à´àµà´àµà´¤à´¨àµà´¨àµ."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +332,34 @@
msgstr "വിവരà´àµà´àµ¾, à´à´°à´¿à´àµà´àµ½
à´¶àµà´à´°à´¿à´àµà´à´¾àµ½ പിനàµà´¨àµ, à´¦àµà´°àµà´ªà´¯àµà´à´
à´àµà´¯àµà´¯à´ªàµà´ªàµà´àµà´¨àµà´¨àµ"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -281,9 +395,50 @@
"à´àµà´àµà´àµà´à´¥à´¯à´¾à´£àµàµ."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -296,7 +451,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +478,31 @@
"à´à´¦à´¾à´¹à´°à´£à´àµà´à´³àµà´</a> à´à´ªà´¿à´¯àµà´àµà´àµàµ (AP)
à´
റിയാà´."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -330,7 +510,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +543,17 @@
"à´¤à´àµ¼à´àµà´à´¯àµà´£àµà´à´¾à´àµà´µà´¾à´¨àµà´
സാധàµà´¯à´¤à´¯àµà´£àµà´àµàµ."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"വലിയതàµà´¤à´¿à´²àµà´³àµà´³ സർവàµà´¯à´¿à´²àµ»à´¸àµ
à´¶àµà´·à´¿ à´à´ªà´¯àµà´à´¿à´àµà´àµàµ <a href=\"http://www.nytimes."
@@ -406,10 +594,18 @@
"à´¨à´à´ªàµà´ªà´¿à´²à´¾à´àµà´àµà´à´¯à´¾à´£àµà´àµà´à´¿àµ½."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"à´à´¨àµà´¨à´¿à´°àµà´¨àµà´¨à´¾à´²àµà´, à´
à´¤àµà´¤à´°à´ നിയമ
പരിരà´àµà´·à´àµ¾ à´
à´¸àµà´¥à´¿à´°à´®à´¾à´£àµàµ
à´à´¨àµà´¨à´¾à´£àµàµ സമàµà´ªà´à´¾à´² à´à´°à´¿à´¤àµà´°à´
à´à´¾à´£à´¿à´àµà´àµà´¤à´°àµà´¨àµà´¨à´¤àµàµ, "
"à´
à´µ റദàµà´¦àµà´àµà´¯àµà´¯à´ªàµà´ªàµà´à´¾à´ (à´«à´¿à´¸ (FISA)
à´
à´®àµà´¨àµà´±àµà´®àµà´¨àµà´±àµ à´à´àµà´à´¿à´²àµà´¤àµ
à´ªàµà´²àµ), മാറàµà´±à´¿ à´µàµà´¯àµà´àµà´à´ªàµà´ªàµà´à´¾à´, "
@@ -500,8 +696,29 @@
"à´
താവശàµà´¯à´ªàµà´ªàµà´àµà´."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -687,20 +904,49 @@
"à´¶àµà´à´°à´¿à´àµà´ ഡാറàµà´± യഥാà´àµà´°à´®à´
à´à´°à´£à´àµà´à´¤àµà´¤à´¿à´¨àµ à´²à´àµà´¯à´®à´¾à´àµà´."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"à´ªàµà´°à´¿à´¸à´ (PRISM) à´ªàµà´°àµà´àµà´°à´¾à´ വഴി,
à´àµ»à´à´¸àµà´, <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">പല à´àµà´®àµ» à´à´¨àµà´±àµ¼à´¨àµà´±àµà´±àµ
à´àµàµ¼à´ªàµà´ªà´±àµà´·à´¨àµà´à´³àµà´àµ
ഡാറàµà´±à´¬àµà´¸à´¿à´²àµà´àµà´àµà´ "
@@ -751,15 +997,38 @@
"à´¸àµà´µà´à´¾à´°àµà´¯à´¤à´¯àµ à´²à´à´à´¿à´àµà´à´¾à´¨àµà´³àµà´³
à´à´àµà´àµà´±àµ
à´à´´à´¿à´µàµà´à´´à´¿à´µàµà´à´³à´¾à´£àµà´¨àµà´¨àµàµ
നമàµà´àµà´àµà´²àµà´²à´¾à´ à´¬àµà´§àµà´¯à´®àµà´£àµà´àµ
താനàµà´."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -775,10 +1044,20 @@
"à´¤à´à´¯à´¾à´¤à´¿à´°à´¿à´àµà´àµà´¨àµà´¨à´¤à´¿à´¨àµà´ à´
à´¨àµà´¯àµà´àµà´¯à´®à´¾à´¯
à´¸à´àµà´àµà´à´°à´£à´àµà´à´³à´¾à´£àµàµ."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"à´
à´àµà´à´¾à´¤à´®à´¾à´¯à´¿
വിലയà´à´àµà´àµà´¨àµà´¨à´¤à´¿à´¨àµà´³àµà´³ മറàµà´±àµà´°àµ
സാധàµà´¯à´®à´¾à´¯ മാർà´à´ <a href=\"https://stallman.org/"
"articles/anonymous-payments-thru-phones.html\">à´ªàµà´°àµà´ªàµà´¯àµà´¡àµ
à´«àµàµº à´à´¾àµ¼à´¡àµà´àµ¾</a> "
@@ -925,18 +1204,42 @@
msgstr "à´µàµà´¯à´àµà´¤à´¿à´à´¤ à´à´¶à´¯à´µà´¿à´¨à´¿à´®à´¯
ഫയലàµà´àµ¾à´àµà´àµà´³àµà´³ പരിഹാരà´"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"à´à´¨àµà´±àµ¼à´¨àµà´±àµà´±àµ à´¸àµà´µà´¨ ദായà´à´°àµà´
à´àµà´²à´¿à´«àµàµº à´à´®àµà´ªà´¨à´¿à´à´³àµà´ à´
വരàµà´àµ
à´à´ªà´¯àµà´àµà´¤à´¾à´àµà´à´³àµà´àµ
à´àµà´£àµà´à´¾à´àµà´àµà´à´³à´¿àµ½ സമà´àµà´°à´®à´¾à´¯ "
"ഡാറàµà´± à´¸àµà´àµà´·à´¿à´àµà´àµ à´µàµà´àµà´àµà´¨àµà´¨àµ
(à´¬àµà´°àµà´¸à´¿à´àµ, à´«àµàµº à´àµà´³àµà´àµ¾,
à´¤àµà´à´àµà´à´¿à´¯à´µ). à´®àµà´¬àµàµ½ à´«àµà´£àµà´àµ¾
à´à´ªà´¯àµà´à´¿à´àµà´àµàµ, <a "
@@ -963,10 +1266,32 @@
"à´àµà´à´¤à´¿ à´à´¤àµà´¤à´°à´µàµà´¨àµà´¨àµà´ à´à´²àµà´²à´¾à´¤àµ
ഠവിവരà´àµà´àµ¾ à´¸àµà´àµà´·à´¿à´àµà´àµà´µà´¾àµ» à´
à´¨àµà´µà´¦à´¿à´àµà´à´°àµà´¤àµàµ."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1028,6 +1353,30 @@
"à´¡à´¿à´à´¿à´±àµà´±àµ½ സിസàµà´±àµà´±à´àµà´à´³à´¿àµ½
വൻതàµà´¤à´¿àµ½ à´µàµà´¯à´àµà´¤à´¿à´à´¤ ഫയലàµà´àµ¾
à´¸àµà´µà´°àµà´ªà´¿à´àµà´àµà´¨àµà´¨à´¤àµ
à´¤à´à´¯àµà´à´¯à´¾à´£àµà´àµà´à´¿àµ½."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1037,7 +1386,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1055,12 +1404,33 @@
"police-edition\">à´
വരàµà´àµ ബലപàµà´°à´¯àµà´à´ 60%
à´àµà´±à´àµà´àµ</a>. à´à´¸à´¿à´àµ½à´¯àµ (ACLU) à´à´¤à´¿à´¨àµàµ à´
à´¨àµà´àµà´²à´®à´¾à´£àµàµ."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1170,6 +1540,7 @@
"നിരàµâà´¦àµà´¦àµà´¶à´àµà´à´³àµà´ à´
à´à´¿à´ªàµà´°à´¾à´¯à´àµà´à´³àµà´ <a
href=\"mailto:webmasters@gnu.org\"><"
"webmasters@gnu.org></a> à´à´¨àµà´¨
വിലാസതàµà´¤à´¿à´²àµà´¯àµà´àµà´àµàµ
à´à´´àµà´¤à´¾à´µàµà´¨àµà´¨à´¤à´¾à´£àµàµ."
+# TODO: submitting -> contributing.
# type: Content of: <div><p>
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -1178,14 +1549,20 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"à´àµà´¨àµ താളàµà´à´³àµà´àµ മലയാളà´
പരിà´à´¾à´·à´à´³àµâ à´àµà´¤àµà´¯à´µàµà´
നിലവാരമàµà´³àµà´³à´¤àµà´®à´¾à´àµà´à´¾àµ»
à´à´àµà´à´³àµâ പരമാവധി
à´¶àµà´°à´®à´¿à´àµà´àµà´¨àµà´¨àµà´£àµà´àµàµ. "
@@ -1196,9 +1573,10 @@
"README.translations.html\">Translations README</a> à´¨àµà´àµà´àµà´."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman | "
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman | "
"റിà´àµà´à´¾àµ¼à´¡àµ à´¸àµà´±àµà´±à´¾àµ¾à´®à´¾àµ»"
#. type: Content of: <div><p>
@@ -1223,12 +1601,10 @@
msgid "Updated:"
msgstr "à´ªàµà´¤àµà´àµà´à´¿à´¯à´¤àµàµ:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman | "
-"റിà´àµà´à´¾àµ¼à´¡àµ à´¸àµà´±àµà´±à´¾àµ¾à´®à´¾àµ»"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman | "
+#~ "റിà´àµà´à´¾àµ¼à´¡àµ à´¸àµà´±àµà´±à´¾àµ¾à´®à´¾àµ»"
#~ msgid ""
#~ "Thanks to Edward Snowden's disclosures, we know that the current level of "
Index: surveillance-vs-democracy.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- surveillance-vs-democracy.nl.po 3 Jul 2021 07:55:45 -0000 1.54
+++ surveillance-vs-democracy.nl.po 3 Jul 2021 08:01:32 -0000 1.55
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2021-05-06 20:44+0200\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -31,7 +32,10 @@
msgstr "Hoeveel controle kan onze democratie verdragen?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "door <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -124,6 +128,32 @@
"klokkenluiders erop kunnen vertrouwen dat zij veilig zijn."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -131,10 +161,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -153,8 +183,24 @@
"internet begeven</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -188,19 +234,48 @@
"verdragen."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Een naamloze overheidsambtenaar in de VS vertelde in 2011 aan journalisten "
"dat de <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-"
@@ -216,10 +291,27 @@
"verizon-2013-06-07\">ook andere bedrijven</a>."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -239,12 +331,34 @@
msgstr "Eenmaal verzamelde informatie zal worden misbruikt"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -279,9 +393,50 @@
"geloven als je dat wilt."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -294,7 +449,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -322,6 +477,31 @@
"com/699236946e3140659fff8a2362e16f43\">veel meer voorbeelden in de VS</a>."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -329,7 +509,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +543,17 @@
"shtml\">krakers die voor vijandelijke landen werken</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Overheden kunnen massale surveillance-mogelijkheden gemakkelijk gebruiken om "
@@ -407,10 +595,18 @@
"aangenomen en zonder enige uitzondering altijd worden doorgevoerd."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Zulke wettelijke bescherming is echter wankel: zoals de recente geschiedenis "
"ons laat zien, kan een dergelijke wet worden teruggedraaid (zoals in de FISA "
@@ -503,8 +699,29 @@
"ook dat je al jouw gegevens aan een server overhandigt."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -695,20 +912,49 @@
"overheid."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"De NSA heeft via PRISM <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">toegang verkregen tot gegevensbanken van veel grote "
@@ -761,15 +1007,38 @@
"om privacy te schenden en niet iets om je aan te houden."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -785,10 +1054,20 @@
"met bedrijven nodig, en een overheid die geen belemmering vormt."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"<a href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
"\">Prepaid telefoonkaarten</a> zijn een andere mogelijke manier om anonieme "
@@ -943,18 +1222,42 @@
msgstr "Oplossing voor communicatiedossiers"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Internetaanbieders en telefoonbedrijven bewaren uitgebreide contactgegevens "
"van hun klanten (browsing, telefoongesprekken, enz.). Met mobiele telefoons "
@@ -983,10 +1286,32 @@
"een rechter om een bepaalde partij te volgen."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1054,6 +1379,30 @@
"de openbaring."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1063,7 +1412,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1081,12 +1430,33 @@
"dwang met 60% was verminderd</a>. De ACLU is hier voorstander van."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1203,14 +1573,20 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"We doen ons best om goede vertalingen te maken maar staan altijd open voor "
@@ -1220,8 +1596,10 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1245,8 +1623,18 @@
msgid "Updated:"
msgstr "Bijgewerkt:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "We doen ons best om goede vertalingen te maken maar staan altijd open "
+#~ "voor verbeteringen. Suggesties, op- en aanmerkingen sturen aan: <a href="
+#~ "\"mailto:web-translators@gnu.org\"><web-translators@gnu.org></a>.</"
+#~ "p> <p>Zie <a href=\"/server/standards/README.translations.html\"> "
+#~ "Translations README</a> voor informatie over het onderhoud van "
+#~ "vertalingen op deze website."
+
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.pot
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pot,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- surveillance-vs-democracy.pot 17 Dec 2020 21:31:17 -0000 1.55
+++ surveillance-vs-democracy.pot 3 Jul 2021 08:01:32 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -27,7 +27,7 @@
msgstr ""
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr ""
#. type: Content of: <blockquote><p><em>
@@ -99,17 +99,17 @@
"software; the NSA <a "
"href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
"
"and even <a "
-"href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
"
+"href=\"https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
"
"security weaknesses in nonfree software to invade our own computers and "
"routers. Free software gives us control of our own computers, but <a "
-"href=\"http://www.wired.com/opinion/2013/10/149481/\">that won't protect our "
-"privacy once we set foot on the Internet</a>."
+"href=\"https://www.wired.com/opinion/2013/10/149481/\">that won't protect "
+"our privacy once we set foot on the Internet</a>."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
"<a "
-"href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
"
+"href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
"
"legislation to “curtail the domestic surveillance powers”</a> in "
"the U.S. is being drawn up, but it relies on limiting the government's use "
"of our virtual dossiers. That won't suffice to protect whistleblowers if "
@@ -133,16 +133,16 @@
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a "
-"href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.
"
+"href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.
"
"would not subpoena reporters because “We know who you're talking "
"to.”</a> Sometimes <a "
-"href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
"
+"href=\"https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
"
"phone call records are subpoenaed</a> to find this out, but Snowden has "
"shown us that in effect they subpoena all the phone call records of everyone "
"in the U.S., all the time, <a "
"href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
"
"Verizon</a> and <a "
-"href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
"
+"href=\"https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
"
"other companies too</a>."
msgstr ""
@@ -151,7 +151,7 @@
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the "
"U.S. government's <a "
-"href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic "
+"href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic "
"practice of infiltrating peaceful dissident groups</a> on the pretext that "
"there might be terrorists among them. The point at which surveillance is "
"too much is the point at which the state can find who spoke to a known "
@@ -169,7 +169,7 @@
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
"court, which said it was <a "
-"href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable to "
+"href=\"https://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable to "
"effectively hold the NSA accountable</a>.) Suspicion of a crime will be "
"grounds for access, so once a whistleblower is accused of "
"“espionage,” finding the “spy” will provide an "
@@ -190,7 +190,7 @@
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a "
-"href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
"
+"href=\"https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
"
"U.S. surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
"has caught and punished this a few times; we don't know how many other times "
@@ -203,7 +203,7 @@
"href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
"
"digital systems</a>. In 2016, a prosecutor was accused of forging judges' "
"signatures to get authorization to <a "
-"href=\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
"
+"href=\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
"
"wiretap someone who was the object of a romantic obsession</a>. The AP knows "
"of <a href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many "
"other instances in the US</a>."
@@ -218,7 +218,7 @@
"href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
"
"<a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the "
"US</a>, and most recently <a "
-"href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
"
+"href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
"
"(Turkey's confusion about who had really used the Bylock program only "
"exacerbated the basic deliberate injustice of arbitrarily punishing people "
"for having used it.)"
@@ -235,7 +235,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Governments can easily use massive surveillance capability to <a "
-"href=\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
"
+"href=\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
"
"democracy directly</a>."
msgstr ""
@@ -266,7 +266,7 @@
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-"href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"href=\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
#. type: Content of: <div><div><p>
@@ -326,7 +326,7 @@
#. type: Content of: <div><div><p>
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a "
-"href=\"http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
"
+"href=\"https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
"
"give out their personal information</a> except how to contact them, and "
"never give any web site your list of email or phone contacts. Don't tell a "
"company such as Facebook anything about your friends that they might not "
@@ -444,10 +444,10 @@
#. type: Content of: <div><div><p>
msgid ""
"The NSA, through PRISM, has <a "
-"href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten into the "
-"databases of many large Internet corporations</a>. AT&T has saved all "
-"its phone call records since 1987 and <a "
-"href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
"
+"href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten
"
+"into the databases of many large Internet corporations</a>. AT&T has "
+"saved all its phone call records since 1987 and <a "
+"href=\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
"
"them available to the DEA</a> to search on request. Strictly speaking, the "
"U.S. government does not possess that data, but in practical terms it may "
"as well possess it. Some companies are praised for <a "
@@ -485,20 +485,20 @@
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
"payee dodge taxes.) <a "
-"href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
"
+"href=\"https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
"
"is not anonymous</a>, though there are efforts to develop ways to pay "
"anonymously with Bitcoin. However, technology for <a "
-"href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital cash "
-"was first developed in the 1980s</a>; the GNU software for doing this is "
-"called <a href=\"http://taler.net/\">GNU Taler</a>. Now we need only "
+"href=\"https://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital "
+"cash was first developed in the 1980s</a>; the GNU software for doing this "
+"is called <a href=\"https://taler.net/\">GNU Taler</a>. Now we need only "
"suitable business arrangements, and for the state not to obstruct them."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
"Another possible method for anonymous payments would use <a "
-"href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid
"
-"phone cards</a>. It is less convenient, but very easy to implement."
+"href=\"/philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. "
+"It is less convenient, but very easy to implement."
msgstr ""
#. type: Content of: <div><div><p>
@@ -595,10 +595,10 @@
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
"they also <a "
-"href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record
"
+"href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record
"
"the user's physical location</a>. They keep these dossiers for a long time: "
"over 30 years, in the case of AT&T. Soon they will even <a "
-"href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
"
+"href=\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
"
"the user's body activities</a>. It appears that the <a "
"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
"
"collects cell phone location data</a> in bulk."
@@ -617,7 +617,7 @@
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
"generated—which is what the <a "
-"href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
"
+"href=\"https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
"
"does with some or all phone companies</a>. We would have to rely on "
"prohibiting that by law. However, that would be better than the current "
"situation, where the relevant law (the PAT RIOT Act) does not clearly "
@@ -664,7 +664,7 @@
"href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
"
"photographers</a>.) One city in California that required police to wear "
"video cameras all the time found <a "
-"href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
"
+"href=\"https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
"
"use of force fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -675,10 +675,10 @@
"are not people, and not entitled to human rights</a>. It is legitimate to "
"require businesses to publish the details of processes that might cause "
"chemical, biological, nuclear, fiscal, computational (e.g., <a "
-"href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
-"hazards to society, to whatever level is needed for public well-being. The "
-"danger of these operations (consider the BP oil spill, the Fukushima "
-"meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
+"href=\"https://DefectiveByDesign.org\">DRM</a>) or political (e.g., "
+"lobbying) hazards to society, to whatever level is needed for public "
+"well-being. The danger of these operations (consider the BP oil spill, the "
+"Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgstr ""
#. type: Content of: <div><div><p>
@@ -751,7 +751,7 @@
#
#. <web-translators@gnu.org></a>.</p>
#
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
@@ -759,11 +759,12 @@
msgid ""
"Please see the <a "
"href=\"/server/standards/README.translations.html\">Translations README</a> "
-"for information on coordinating and submitting translations of this article."
+"for information on coordinating and contributing translations of this "
+"article."
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard
Stallman"
msgstr ""
#. type: Content of: <div><p>
Index: surveillance-vs-democracy.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.pt-br.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- surveillance-vs-democracy.pt-br.po 3 Jul 2021 07:55:45 -0000 1.69
+++ surveillance-vs-democracy.pt-br.po 3 Jul 2021 08:01:32 -0000 1.70
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2020-12-19 10:30-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 3.38.0\n"
@@ -33,7 +34,9 @@
msgstr "Qual o NÃvel de Vigilância Que a Democracia Pode Suportar?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "por <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -126,6 +129,20 @@
"seguros."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -133,10 +150,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -154,8 +171,17 @@
"privacidade quando utilizamos a Internet</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -188,19 +214,34 @@
"tolerar."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Um oficial não identificado do governo dos EUA falou de forma ameaçadora a "
"jornalistas em 2011 que os <a href=\"http://www.rcfp.org/browse-media-law-"
@@ -217,10 +258,19 @@
"empresas operadoras de comunicação também</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +290,24 @@
msgstr "A Informação, Uma Vez Coletada, Será Utilizada de Modo Abusivo"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -280,9 +342,30 @@
"fadas que podemos acreditar se quisermos."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -295,7 +378,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -322,6 +405,20 @@
"com/699236946e3140659fff8a2362e16f43\">muitas outras ocorrências nos
EUA</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -329,7 +426,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -363,9 +460,14 @@
"hostis</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Governos podem facilmente usar a capacidade de vigilância em massa para <a "
@@ -407,10 +509,15 @@
"para sempre."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Porém, tais proteções legais são precárias: como a história recente
mostra, "
"elas pode ser repelidas (como aconteceu com o <i>FISA Amendments Act</i>), "
@@ -501,8 +608,20 @@
"dados pertinentes do servidor da empresa."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -688,20 +807,35 @@
"Estado."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"A NSA, por meio do software de vigilância PRISM, <a href=\"https://www."
"commondreams.org/headline/2013/08/23-2\">conseguiu entrar nas bases de dados "
@@ -755,15 +889,27 @@
"para violação de privacidade do que compromisso de cumprimento."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -779,10 +925,16 @@
"Estado não o obstrua."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Um outro método possÃvel para pagamentos anônimos seria usar <a href="
"\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
@@ -934,18 +1086,31 @@
msgstr "Remédio para Dossiês de Comunicação"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Provedores de serviços de Internet e de telefone mantém dados extensivos de
"
"seus contatos de usuários (navegação, chamadas telefônicas etc.). Com "
@@ -973,10 +1138,22 @@
"tempo, na ausência de uma ordem judicial para vigiar uma determinada pessoa."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1042,6 +1219,20 @@
"sistemas digitais acumulem dossiês massivos antes do fato."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1051,7 +1242,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1070,12 +1261,23 @@
"\">o uso da força deles caiu em 60%</a>;. A ACLU concorda com isto."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1239,14 +1441,14 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"A equipe de traduções para o português brasileiro se esforça para
oferecer "
@@ -1254,12 +1456,14 @@
"favor, envie seus comentários e sugestões em geral sobre as traduções
para "
"<a href=\"mailto:web-translators@gnu.org\"><web-translators@gnu.org></"
"a>. </p><p>Consulte o <a href=\"/server/standards/README.translations.html"
-"\">Guia para as traduções</a> para mais informações sobre a coordenação
e o "
-"envio de traduções das páginas deste site."
+"\">Guia para as traduções</a> para mais informações sobre a coordenação
e a "
+"contribuição com traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1288,8 +1492,6 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ru.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- surveillance-vs-democracy.ru.po 3 Jul 2021 07:55:45 -0000 1.125
+++ surveillance-vs-democracy.ru.po 3 Jul 2021 08:01:32 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2020-07-18 09:27+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -30,7 +31,10 @@
# type: Content of: <p>
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+# | by <a href=\"http{+s+}://www.stallman.org/\">Richard Stallman</a>
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">РиÑаÑд СÑолмен</a>"
#. type: Content of: <blockquote><p><em>
@@ -125,6 +129,32 @@
"до велиÑинÑ, пÑи коÑоÑой оÑведомиÑели
бÑдÑÑ Ð·Ð½Ð°ÑÑ, ÑÑо они в безопаÑноÑÑи."
#. type: Content of: <div><div><p>
+# | Using free/libre software, <a
+# | href=\"/philosophy/free-software-even-more-important.html\">as I've
+# | advocated since 1983</a>, is the first step in taking control of our
+# | digital lives, and that includes preventing surveillance. We can't trust
+# | nonfree software; the NSA <a
+# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
+# | and even <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
+# | security weaknesses in nonfree software to invade our own computers and
+# | routers. Free software gives us control of our own computers, but <a
+# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
+# | protect our privacy once we set foot on the Internet</a>.
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -132,10 +162,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -154,8 +184,24 @@
"когда Ð¼Ñ Ð²ÑÑ
одим в ÐнÑеÑнеÑ</a>."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
+# | legislation to “curtail the domestic surveillance powers”</a>
+# | in the U.S. is being drawn up, but it relies on limiting the government's
+# | use of our virtual dossiers. That won't suffice to protect whistleblowers
+# | if “catching the whistleblower” is grounds for access
+# | sufficient to identify him or her. We need to go further.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -189,19 +235,48 @@
"ÑлиÑком велика, ÑÑÐ¾Ð±Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÐ¸Ñ Ð¼Ð¾Ð³Ð»Ð° ее
вÑдеÑжаÑÑ."
#. type: Content of: <div><div><p>
+# | An unnamed U.S. government official ominously told journalists in 2011
+# | that the <a
+# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
+# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
+# | would not subpoena reporters because “We know who you're talking
+# | to.”</a> Sometimes <a
+# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
+# | phone call records are subpoenaed</a> to find this out, but Snowden has
+# | shown us that in effect they subpoena all the phone call records of
+# | everyone in the U.S., all the time, <a
+# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
+# | Verizon</a> and <a
+# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
+# | other companies too</a>.
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Ðекое должноÑÑное лиÑо админиÑÑÑаÑии СШÐ
зловеÑе заÑвило жÑÑналиÑÑам в "
"2011 годÑ, ÑÑо <a
href=\"http://www.rcfp.org/browse-media-law-resources/"
@@ -217,10 +292,27 @@
"into-networks-beyond-verizon-2013-06-07\"> а Ñакже Ð¾Ñ Ð´ÑÑгиÑ
компаний</a>."
#. type: Content of: <div><div><p>
+# | Opposition and dissident activities need to keep secrets from states that
+# | are willing to play dirty tricks on them. The ACLU has demonstrated the
+# | U.S. government's <a
+# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
+# | practice of infiltrating peaceful dissident groups</a> on the pretext that
+# | there might be terrorists among them. The point at which surveillance is
+# | too much is the point at which the state can find who spoke to a known
+# | journalist or a known dissident.
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +332,34 @@
msgstr "ÐÐ´Ð½Ð°Ð¶Ð´Ñ ÑобÑаннÑми ÑведениÑми бÑдÑÑ
злоÑпоÑÑеблÑÑÑ"
#. type: Content of: <div><div><p>
+# | When people recognize that the level of general surveillance is too high,
+# | the first response is to propose limits on access to the accumulated data.
+# | That sounds nice, but it won't fix the problem, not even slightly, even
+# | supposing that the government obeys the rules. (The NSA has misled the
+# | FISA court, which said it was <a
+# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
+# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
+# | grounds for access, so once a whistleblower is accused of
+# | “espionage,” finding the “spy” will provide an
+# | excuse to access the accumulated material.
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -281,9 +395,50 @@
"можем веÑиÑÑ, еÑли нам Ñгодно."
#. type: Content of: <div><div><p>
+# | In addition, the state's surveillance staff will misuse the data for
+# | personal reasons. Some NSA agents <a
+# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
+# | U.S. surveillance systems to track their lovers</a>—past, present,
+# | or wished-for—in a practice called “LOVEINT.” The NSA
+# | says it has caught and punished this a few times; we don't know how many
+# | other times it wasn't caught. But these events shouldn't surprise us,
+# | because police have long <a
+# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
+# | their access to driver's license records to track down someone
+# | attractive</a>, a practice known as “running a plate for a
+# | date.” This practice has expanded with <a
+# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
+# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
+# | signatures to get authorization to <a
+# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
+# | wiretap someone who was the object of a romantic obsession</a>. The AP
+# | knows of <a
+# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
+# | instances in the US</a>.
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -296,7 +451,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +478,31 @@
"пÑимеÑов в СШÐ</a>."
#. type: Content of: <div><div><p>
+# | Surveillance data will always be used for other purposes, even if this is
+# | prohibited. Once the data has been accumulated and the state has the
+# | possibility of access to it, it can misuse that data in dreadful ways, as
+# | shown by examples from <a
+# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
+# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
+# | US</a>, and most recently <a
+# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
+# | (Turkey's confusion about who had really used the Bylock program only
+# | exacerbated the basic deliberate injustice of arbitrarily punishing people
+# | for having used it.)
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -330,7 +510,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -364,9 +544,17 @@
"гоÑÑдаÑÑÑва</a>."
#. type: Content of: <div><div><p>
+# | Governments can easily use massive surveillance capability to <a
+# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
+# | democracy directly</a>.
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"ÐÑавÑÑие ÑÐµÐ¶Ð¸Ð¼Ñ Ð¼Ð¾Ð³ÑÑ Ð»ÐµÐ³ÐºÐ¾
воÑполÑзоваÑÑÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑÑ Ð¼Ð°ÑÑовой
Ñлежки, "
@@ -408,10 +596,18 @@
"иÑклÑÑений."
#. type: Content of: <div><div><p>
+# | However, such legal protections are precarious: as recent history shows,
+# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
+# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Ðднако Ñакой ÑÑидиÑеÑкой заÑиÑÑ Ð½Ðµ
доÑÑаÑоÑно: как показÑваÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ð¸Ðµ "
"ÑобÑÑиÑ, они могÑÑ Ð±ÑÑÑ Ð¾ÑÐ¾Ð·Ð²Ð°Ð½Ñ (как
Ðакон о попÑавкаÑ
в FISA), дейÑÑвие иÑ
"
@@ -502,8 +698,29 @@
"обÑабаÑÑваемÑÑ
даннÑÑ
на ÑеÑÐ²ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸."
#. type: Content of: <div><div><p>
+# | Protect your friends' and acquaintances' privacy, too. <a
+# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
+# | give out their personal information</a> except how to contact them, and
+# | never give any web site your list of email or phone contacts. Don't tell
+# | a company such as Facebook anything about your friends that they might not
+# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
+# | all. Reject communication systems that require users to give their real
+# | names, even if you are happy to divulge yours, since they pressure other
+# | people to surrender their privacy.
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -689,20 +906,49 @@
"гоÑÑдаÑÑÑвÑ."
#. type: Content of: <div><div><p>
+# | The NSA, through PRISM, has <a
+# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
+# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
+# | into the databases of many large Internet corporations</a>. AT&T has
+# | saved all its phone call records since 1987 and <a
+# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
+# | them available to the DEA</a> to search on request. Strictly speaking,
+# | the U.S. government does not possess that data, but in practical terms it
+# | may as well possess it. Some companies are praised for <a
+# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
+# | government data requests to the limited extent they can</a>, but that can
+# | only partly compensate for the harm they do to by collecting that data in
+# | the first place. In addition, many of those companies misuse the data
+# | directly or provide it to data brokers.
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"ÐÐÐ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ PRISM <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\"> пÑоникло в Ð±Ð°Ð·Ñ Ð´Ð°Ð½Ð½ÑÑ
многиÑ
кÑÑпнÑÑ
коÑпоÑаÑий в "
@@ -756,15 +1002,38 @@
"конÑиденÑиалÑноÑÑи, Ñем намеÑениÑ
ÑоблÑдаÑÑ ÐµÐµ."
#. type: Content of: <div><div><p>
+# | We could correct both problems by adopting a system of anonymous
+# | payments—anonymous for the payer, that is. (We don't want to help
+# | the payee dodge taxes.) <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
+# | is not anonymous</a>, though there are efforts to develop ways to pay
+# | anonymously with Bitcoin. However, technology for <a
+# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
+# | cash was first developed in the 1980s</a>; the GNU software for doing this
+# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
+# | only suitable business arrangements, and for the state not to obstruct
+# | them.
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -780,10 +1049,20 @@
"пÑепÑÑÑÑвовало Ð±Ñ ÑÑомÑ."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+# | Another possible method for anonymous payments would use <a
+# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
+# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
+# | cards</a>. It is less convenient, but very easy to implement.
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"ÐÑÑгой возможнÑй меÑод анонимнÑÑ
плаÑежей — <a href=\"https://"
"stallman.org/articles/anonymous-payments-thru-phones.html\">
пÑедваÑиÑелÑно "
@@ -932,18 +1211,42 @@
msgstr "ÐеÑÑ Ð¿ÑоÑив коммÑникаÑионнÑÑ
доÑÑе"
#. type: Content of: <div><div><p>
+# | Internet service providers and telephone companies keep extensive data on
+# | their users' contacts (browsing, phone calls, etc). With mobile phones,
+# | they also <a
+# |
[-href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record-]
+# |
{+href=\"https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record+}
+# | the user's physical location</a>. They keep these dossiers for a long
+# | time: over 30 years, in the case of AT&T. Soon they will even <a
+# |
href=\"http{+s+}://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record
+# | the user's body activities</a>. It appears that the <a
+# |
href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA
+# | collects cell phone location data</a> in bulk.
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"ÐоÑÑавÑики ÑÑлÑг ÐнÑеÑнеÑа и ÑелеÑоннÑе
компании Ñ
ÑанÑÑ Ð¾Ð±ÑиÑнÑе ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ "
"конÑакÑаÑ
ÑвоиÑ
полÑзоваÑелей (пÑоÑмоÑÑ
ÑÑÑÐ°Ð½Ð¸Ñ ÐнÑеÑнеÑа, ÑелеÑоннÑе вÑÐ·Ð¾Ð²Ñ "
@@ -973,10 +1276,32 @@
"ÑÑдебном поÑÑдке."
#. type: Content of: <div><div><p>
+# | This solution is not entirely satisfactory, because it won't physically
+# | stop the government from collecting all the information immediately as it
+# | is generated—which is what the <a
+# |
href=\"http{+s+}://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S.
+# | does with some or all phone companies</a>. We would have to rely on
+# | prohibiting that by law. However, that would be better than the current
+# | situation, where the relevant law (the PAT RIOT Act) does not clearly
+# | prohibit the practice. In addition, if the government did resume this
+# | sort of surveillance, it would not get data about everyone's phone calls
+# | made prior to that time.
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1041,6 +1366,30 @@
"доÑÑе ÑиÑÑовÑми ÑиÑÑемами."
#. type: Content of: <div><div><p>
+# | Individuals with special state-granted power, such as police, forfeit
+# | their right to privacy and must be monitored. (In fact, police have their
+# | own jargon term for perjury, “<a
+# |
href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,”
+# | since they do it so frequently, particularly about protesters and <a
+# |
href=\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/\">
+# | photographers</a>.) One city in California that required police to wear
+# | video cameras all the time found <a
+# |
href=\"http{+s+}://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition\">their
+# | use of force fell by 60%</a>. The ACLU is in favor of this.
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1050,7 +1399,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1069,12 +1418,33 @@
"пÑименение ÑÐ¸Ð»Ñ Ð¿Ð¾Ð»Ð¸ÑейÑкими ÑокÑаÑилоÑÑ
на 60%</a>. ACLU поддеÑÐ¶Ð¸Ð²Ð°ÐµÑ ÑÑо."
#. type: Content of: <div><div><p>
+# | <a
+# |
href=\"https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations
+# | are not people, and not entitled to human rights</a>. It is legitimate to
+# | require businesses to publish the details of processes that might cause
+# | chemical, biological, nuclear, fiscal, computational (e.g., <a
+# | href=\"http{+s+}://DefectiveByDesign.org\">DRM</a>) or political (e.g.,
+# | lobbying) hazards to society, to whatever level is needed for public
+# | well-being. The danger of these operations (consider the BP oil spill,
+# | the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of
+# | terrorism.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1187,14 +1557,20 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"ÐÑ ÑÑаÑалиÑÑ ÑделаÑÑ ÑÑÐ¾Ñ Ð¿ÐµÑевод ÑоÑнÑм
и каÑеÑÑвеннÑм, но иÑклÑÑиÑÑ "
@@ -1205,11 +1581,12 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman<br /"
-">Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc. (translation)"
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard "
+"Stallman<br />Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
+"Software Foundation, Inc. (translation)"
#. type: Content of: <div><p>
msgid ""
@@ -1233,13 +1610,11 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard "
-"Stallman<br />Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
-"Software Foundation, Inc. (translation)"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman<br /"
+#~ ">Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+#~ "Foundation, Inc. (translation)"
#~ msgid ""
#~ "A version of this article was first published in <a href=\"http://www."
Index: surveillance-vs-democracy.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.sq.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- surveillance-vs-democracy.sq.po 31 May 2021 11:30:29 -0000 1.110
+++ surveillance-vs-democracy.sq.po 3 Jul 2021 08:01:32 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"X-Generator: Poedit 2.4.2\n"
#. type: Content of: <title>
@@ -29,7 +30,9 @@
msgstr "Sa Mbikëqyrje Mund të Përballojë Demokracia?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "nga <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -124,6 +127,20 @@
"sekreteve ta dinë se nuk rrezikohen."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -131,10 +148,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -152,8 +169,17 @@
"na e mbron privatësinë, pasi fusim këmbët në Internet</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -188,19 +214,34 @@
"mbikëqyrjeje—shumë, për ta përballuar demokracia."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Një zyrtar i paemër i qeverisë së ShBA-ve u tha në mënyrë ogurzezë "
"gazetarëve më 2011 se <a href=\"http://www.rcfp.org/browse-media-law-"
@@ -217,10 +258,19 @@
"tjera po ashtu</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -240,12 +290,24 @@
msgstr "Informacioni, Pasi Mblidhet, Do Të Keqpërdoret"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -280,9 +342,30 @@
"ta besojmë, në daçim."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -295,7 +378,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -323,6 +406,20 @@
"a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -330,7 +427,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -364,9 +461,14 @@
"shtetesh armiqësore</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Qeveritë mund ta përdorin lehtësisht mundësinë për mbikëqyrje masive
për <a "
@@ -408,10 +510,15 @@
"zbatohen përgjithmonë pa përjashtime."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Por, mbrojtje të tilla ligjore janë pre e synimeve të palëve të
ndryshme: "
"siç e tregon historia e kohëve të fundit, ato mund anulohen (si tek FISA "
@@ -503,8 +610,20 @@
"dorëzoni në shërbyesin e kompanisë krejt të dhënat përkatëse."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -695,20 +814,35 @@
"mund tâi ketë të dhënat që mbledhin kompanitë."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"Përmes PRISM-it, NSA-ja ka <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">hyrë në bazat e të dhënave të mjaft korporatave
të "
@@ -762,15 +896,27 @@
"mbrojtur atë."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -787,10 +933,16 @@
"ato."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Një tjetër metodë për pagesa anonime do të mund të përdorte <a href="
"\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">karta "
@@ -943,18 +1095,31 @@
msgstr "Kurë për Dosjet e Komunikimeve"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Mundësuesit e shërbimeve Internet dhe kompanitë telefonike ruajnë të
dhëna "
"të zgjeruara mbi kontaktet e përdoruesve të tyre (shfletim, thirrje "
@@ -983,10 +1148,22 @@
"për të përgjuar një palë të caktuar."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1052,6 +1229,20 @@
"dixhitalë grumbullimin e dosjeve masive përpara faktit të kryer."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1061,7 +1252,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1079,12 +1270,23 @@
"\">përdorimi i forcës prej tyre ra me 60%</a>. ACLU është në favor të
kësaj."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1190,6 +1392,7 @@
"të dërgohen te <a href=\"mailto:webmasters@gnu.org\"><webmasters@gnu."
"org></a>."
+# TODO: submitting -> contributing.
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -1197,14 +1400,19 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Përpiqemi fort dhe bëjmë sa mundemi për të ofruar përkthime me cilësi
të "
@@ -1216,7 +1424,10 @@
"standards/README.translations.html\">README për përkthimet</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
msgstr ""
"Të drejta kopjimi © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- surveillance-vs-democracy.tr.po 3 Jul 2021 07:55:45 -0000 1.15
+++ surveillance-vs-democracy.tr.po 3 Jul 2021 08:01:32 -0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2021-01-15 18:53+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
"X-Generator: Poedit 2.4.1\n"
#. type: Content of: <title>
@@ -28,7 +29,9 @@
msgstr "Demokrasi Ne Kadar Gözetime Dayanabilir?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "yazan <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <blockquote><p><em>
@@ -121,6 +124,20 @@
"indirmeliyiz."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -128,10 +145,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -150,8 +167,17 @@
"korumuyor</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -184,19 +210,34 @@
"gözetimdir, demokrasinin dayanabileceÄinden daha fazla."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"Ä°simsiz bir ABD hükümeti yetkilisi, 2011âde gazetecilere <a
href=\"http://"
"www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-"
@@ -213,10 +254,19 @@
"aldıklarını göstermiÅtir."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -235,12 +285,24 @@
msgstr "Bilgi Bir Kez Toplanırsa Kötüye Kullanılacak"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -273,9 +335,30 @@
"aksine, bunlar istersek inanabileceÄimiz bir masaldır."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -288,7 +371,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -314,6 +397,20 @@
"biliyor."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -321,7 +418,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -354,9 +451,14 @@
"tarafından elde edilmesi olasıdır."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Hükûmetler <a href=\"http://www.nytimes.com/2015/06/22/world/europe/"
@@ -397,10 +499,15 @@
"demokratik özgürlükleri korumak için yeterli olacaklardır."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Bununla birlikte bu tür yasal korumalar güvencesizdir: Yakın tarihin "
"gösterdiÄi gibi yürürlükten kaldırılabilir (FISA DeÄiÅiklik
Yasası'nda "
@@ -489,8 +596,20 @@
"yanı sıra ilgili tüm verileri Åirketin sunucusuna teslim etmenizi
gerektirir."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -674,20 +793,35 @@
"olarak kullanılabilir durumdadır."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"NSA, PRISM aracılıÄıyla <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\">birçok büyük Ä°nternet Åirketinin veri tabanına "
@@ -739,15 +873,27 @@
"bahanelerdir."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -763,10 +909,16 @@
"engellememesine ihtiyacımız var."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"Anonim ödemeler için bir baÅka olası yöntem ise <a
href=\"https://stallman."
"org/articles/anonymous-payments-thru-phones.html\">ön ödemeli telefon "
@@ -914,18 +1066,31 @@
msgstr "Ä°letiÅim Dosyaları İçin Ãare"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"Ä°nternet servis saÄlayıcıları ve telefon Åirketleri,
kullanıcılarının "
"kiÅileri (tarama, telefon görüÅmeleri vb.) hakkında kapsamlı veri
tutarlar. "
@@ -953,10 +1118,22 @@
"verilmemelidir."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1019,6 +1196,20 @@
"olmayacaktır."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1028,7 +1219,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1045,12 +1236,23 @@
"\">güç kullanımlarının %60 oranında düÅtüÄü</a> bulundu. ACLU
bundan yana."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1157,14 +1359,19 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Ãevirilerimizde bulmuÅ olabileceÄiniz hataları, aklınızdaki soru ve "
@@ -1178,8 +1385,10 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1206,8 +1415,6 @@
msgid "Updated:"
msgstr "Son Güncelleme:"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
Index: surveillance-vs-democracy.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- surveillance-vs-democracy.uk-diff.html 8 Jun 2021 08:44:42 -0000
1.26
+++ surveillance-vs-democracy.uk-diff.html 3 Jul 2021 08:01:32 -0000
1.27
@@ -11,7 +11,8 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.90</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.96 -->
+<!-- This page is derived from
/server/standards/boilerplate.html</em></ins></span> -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -33,7 +34,7 @@
<span class="removed"><del><strong><p</strong></del></span>
<span class="inserted"><ins><em><address</em></ins></span> class="byline
center">by
-<a href="http://www.stallman.org/">Richard <span
class="removed"><del><strong>Stallman</a></p></strong></del></span>
<span
class="inserted"><ins><em>Stallman</a></address></em></ins></span>
+<a <span
class="removed"><del><strong>href="http://www.stallman.org/">Richard
Stallman</a></p></strong></del></span> <span
class="inserted"><ins><em>href="https://www.stallman.org/">Richard
Stallman</a></address></em></ins></span>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
@@ -86,14 +87,15 @@
can't trust nonfree software; the NSA
<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+even <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a></em></ins></span>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+but <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/">that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/">that</em></ins></span>
won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+<span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan</em></ins></span>
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -113,22 +115,23 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+the <a <span
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.</em></ins></span>
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+Sometimes <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'</em></ins></span>
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+and <a <span
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from</em></ins></span>
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+<span
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic</em></ins></span>
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
@@ -144,7 +147,7 @@
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+was <a <span
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable</em></ins></span>
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -160,7 +163,7 @@
<p>In addition, the state's surveillance staff will misuse the data
for personal reasons. Some NSA
-agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+agents <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used</em></ins></span>
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -173,7 +176,7 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+to <a <span
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"></strong></del></span>
<span
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"></em></ins></span>
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a <span
class="removed"><del><strong>href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases">many</strong></del></span>
<span
class="inserted"><ins><em>href="https://apnews.com/699236946e3140659fff8a2362e16f43">many</em></ins></span>
@@ -187,7 +190,7 @@
from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
-recently <a
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
+recently <a <span
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.</em></ins></span>
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
@@ -199,7 +202,7 @@
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+to <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert</em></ins></span>
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -224,7 +227,8 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+<span
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p></em></ins></span>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -267,7 +271,7 @@
pertinent data to the company's server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+too. <a <span
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</strong></del></span>
<span
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't</em></ins></span>
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -364,10 +368,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+has <a <span
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2">gotten</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten</em></ins></span>
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+and <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes</em></ins></span>
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it. Some companies are praised
@@ -397,17 +401,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want to
help the payee dodge
-taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+taxes.) <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin</em></ins></span>
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+for <a <span
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital</em></ins></span>
cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/">GNU Taler</a>. Now we
need
+this is called <a <span
class="removed"><del><strong>href="http://taler.net/">GNU</strong></del></span>
<span
class="inserted"><ins><em>href="https://taler.net/">GNU</em></ins></span>
Taler</a>. Now we need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<p>Another possible method for anonymous payments would
-use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+use <a <span
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html">prepaid</em></ins></span>
phone cards</a>. It is less convenient, but very easy to
implement.</p>
@@ -484,10 +488,10 @@
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+also <a <span
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record</em></ins></span>
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+even <a <span
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record</em></ins></span>
the user's body activities</a>. It appears that
the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
collects cell phone location data</a> in bulk.</p>
@@ -500,7 +504,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+the <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.</em></ins></span>
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -541,7 +545,7 @@
photographers</a>.)</em></ins></span>
One city in California that required police to wear video cameras all
the time
-found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+found <a <span
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their</em></ins></span>
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
@@ -550,7 +554,7 @@
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., <a <span
class="removed"><del><strong>href="http://DefectiveByDesign.org">DRM</a>)</strong></del></span>
<span
class="inserted"><ins><em>href="https://DefectiveByDesign.org">DRM</a>)</em></ins></span>
or political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -595,7 +599,7 @@
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div <span
class="removed"><del><strong>id="footer"></strong></del></span> <span
class="inserted"><ins><em>id="footer" role="contentinfo"></em></ins></span>
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -613,13 +617,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and <span
class="removed"><del><strong>submitting</strong></del></span> <span
class="inserted"><ins><em>contributing</em></ins></span> translations
of this article.</p>
</div>
@@ -640,7 +644,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -650,7 +654,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/08 08:44:42 $
+$Date: 2021/07/03 08:01:32 $
<!-- timestamp end -->
</p>
</div>
Index: surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- surveillance-vs-democracy.uk.po 30 May 2021 08:31:20 -0000 1.88
+++ surveillance-vs-democracy.uk.po 3 Jul 2021 08:01:32 -0000 1.89
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2018-05-23 21:01+0200\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <>\n"
@@ -34,7 +34,9 @@
msgstr "СкÑлÑки ÑÑÐµÐ¶ÐµÐ½Ñ Ð¼Ð¾Ð¶Ðµ виÑÑимаÑи
демокÑаÑÑÑ?"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">Ð ÑÑаÑд СÑолмен</a>"
#. type: Content of: <blockquote><p><em>
@@ -161,10 +163,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -183,8 +185,17 @@
"виÑ
одимо в ÐнÑеÑнеÑ</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -218,19 +229,34 @@
"могла його виÑÑимаÑи."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"ЯкаÑÑ Ð¿Ð¾Ñадова оÑоба адмÑнÑÑÑÑаÑÑÑ Ð¡Ð¨Ð
зловÑÑно заÑвила жÑÑналÑÑÑам Ñ "
"2011 ÑоÑÑ, Ñо <a
href=\"http://www.rcfp.org/browse-media-law-resources/"
@@ -247,10 +273,19 @@
"verizon-2013-06-07\"> а Ñакож вÑд ÑнÑиÑ
компанÑй</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -270,12 +305,24 @@
msgstr "Ðдного ÑÐ°Ð·Ñ Ð·ÑбÑаними вÑдомоÑÑÑми
бÑдÑÑÑ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ñи"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -311,9 +358,30 @@
"можемо вÑÑиÑи, ÑкÑо нам до вподоби."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -326,7 +394,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -353,6 +421,20 @@
"пÑикладÑв Ñ Ð¡Ð¨Ð</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -360,7 +442,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -392,9 +474,14 @@
"worse-than-first.shtml\">зломлÑваÑÑв, ÑÐºÑ Ð¿ÑаÑÑÑÑÑ Ð½Ð°
воÑÐ¾Ð¶Ñ Ð´ÐµÑжави</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"УÑÑди можÑÑÑ Ð»ÐµÐ³ÐºÐ¾ ÑкоÑиÑÑаÑиÑÑ
можливÑÑÑÑ Ð¼Ð°Ñового ÑÑеженнÑ, Ñоб <a href="
@@ -435,10 +522,15 @@
"пÑиймÑÑÑ Ñ Ð¿Ð¾Ð²Ð½Ð¾Ð¼Ñ Ð¾Ð±ÑÑÐ·Ñ Ñ Ð±ÑдÑÑÑ
доÑÑимÑваÑиÑÑ Ð·Ð°Ð²Ð¶Ð´Ð¸ Ñ Ð±ÐµÐ· винÑÑкÑв."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"Ðднак Ñакого ÑÑидиÑного заÑ
иÑÑÑ Ð½Ðµ
доÑÑаÑнÑо: Ñк показÑÑÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ñ Ð¿Ð¾Ð´ÑÑ, "
"вони можÑÑÑ Ð±ÑÑи вÑÐ´ÐºÐ»Ð¸ÐºÐ°Ð½Ñ (Ñк Ðакон пÑо
попÑавки в FISA), дÑÑ ÑÑ
може бÑÑи "
@@ -528,8 +620,20 @@
"обÑиÑленнÑми, Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð²Ñд Ð²Ð°Ñ Ð½Ð°Ð´Ð°Ð½Ð½Ñ
вÑÑÑ
обÑоблÑваниÑ
даниÑ
на ÑеÑвеÑ."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -715,20 +819,35 @@
"ÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ, ÑиÑÑемаÑиÑно
доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"ÐÐРза Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ PRISM <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\"> пÑоникнÑло в бази даниÑ
багаÑÑоÑ
великиÑ
ÑнÑеÑнеÑ-"
@@ -780,15 +899,27 @@
"ÑÑ."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -804,10 +935,16 @@
"пÑдпÑиÑмÑÑв, ÑÐºÑ Ð·Ð°Ð¹Ð¼Ð°Ð»Ð¸ÑÑ Ð± Ñим, Ñ
деÑжави, Ñка б не пеÑеÑкоджала ÑÑомÑ."
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"ÐнÑий можливий ÑпоÑÑб анонÑмниÑ
плаÑежÑв
— <a href=\"https://"
"stallman.org/articles/anonymous-payments-thru-phones.html\">
попеÑеднÑо "
@@ -966,18 +1103,31 @@
msgstr "ÐаÑ
оди пÑоÑи комÑнÑкаÑÑйниÑ
доÑÑÑ"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"ÐоÑÑаÑалÑники поÑлÑг ÑнÑеÑнеÑÑ Ñ
ÑелеÑÐ¾Ð½Ð½Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ Ð·Ð±ÐµÑÑгаÑÑÑ Ð²ÐµÐ»Ð¸ÐºÑ "
"вÑдомоÑÑÑ Ð¿Ñо конÑакÑи ÑвоÑÑ
коÑиÑÑÑваÑÑв (пеÑеглÑд ÑÑоÑÑнок ÐнÑеÑнеÑÑ,
"
@@ -1006,10 +1156,22 @@
"поÑÑдкÑ."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -1072,6 +1234,20 @@
"запобÑжимо попеÑеднÑÐ¾Ð¼Ñ Ð¼Ð°ÑовомÑ
накопиÑÐµÐ½Ð½Ñ Ð´Ð¾ÑÑÑ ÑиÑÑовими ÑиÑÑемами."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -1081,7 +1257,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -1099,12 +1275,23 @@
"Ñили полÑÑейÑÑкими ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. ACLU
пÑдÑÑимÑÑ Ñе."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1213,14 +1400,19 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
"Ðи намагалиÑÑ Ð·ÑобиÑи Ñей пеÑеклад ÑоÑним
Ñа ÑкÑÑним, але виклÑÑиÑи "
@@ -1233,7 +1425,8 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2015, 2016, 2017, 2018 Richard Stallman"
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
msgstr ""
"Copyright © 2015, 2016, 2017, 2018 Richard Stallman (Ð ÑÑаÑд
СÑолмен)"
@@ -1260,6 +1453,19 @@
msgstr "Ðновлено:"
#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "Ðи намагалиÑÑ Ð·ÑобиÑи Ñей пеÑеклад
ÑоÑним Ñа ÑкÑÑним, але виклÑÑиÑи "
+#~ "можливÑÑÑÑ Ð¿Ð¾Ð¼Ð¸Ð»ÐºÐ¸ ми не можемо.
ÐадÑилайÑе, бÑÐ´Ñ Ð»Ð°Ñка, ÑÐ²Ð¾Ñ Ð·Ð°ÑÐ²Ð°Ð¶ÐµÐ½Ð½Ñ "
+#~ "Ñ Ð¿ÑопозиÑÑÑ Ñодо пеÑÐµÐºÐ»Ð°Ð´Ñ Ð·Ð° адÑеÑÐ¾Ñ <a
href=\"mailto:web-"
+#~ "translators@gnu.org\"><web-translators@gnu.org></a>. </"
+#~ "p><p>ÐÑдомоÑÑÑ Ð· кооÑдинаÑÑÑ Ñа
пÑопозиÑÑй пеÑекладÑв наÑиÑ
ÑÑаÑей див. Ñ "
+#~ "<a
href=\"/server/standards/README.translations.html\">“ÐоÑÑбникÑ
з "
+#~ "пеÑекладє</a>."
+
+#~ msgid ""
#~ "A version of this article was first published in <a href=\"http://www."
#~ "wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-"
#~ "survive-surveillance/\">Wired</a> in October 2013."
Index: surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- surveillance-vs-democracy.zh-cn.po 3 Jul 2021 07:55:45 -0000 1.61
+++ surveillance-vs-democracy.zh-cn.po 3 Jul 2021 08:01:32 -0000 1.62
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2020-12-17 21:25+0000\n"
+"POT-Creation-Date: 2021-07-03 07:56+0000\n"
"PO-Revision-Date: 2020-12-18 11:47+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-03 07:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -26,7 +27,9 @@
msgstr "æ°ä¸»è½å¤æ¿åå¤å°çæ§ï¼"
#. type: Content of: <address>
-msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+#, fuzzy
+#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
+msgid "by <a href=\"https://www.stallman.org/\">Richard Stallman</a>"
msgstr "<a href=\"http://www.stallman.org/\">Richard Stallman</a> è"
#. type: Content of: <blockquote><p><em>
@@ -108,6 +111,20 @@
"å¹³éä½å°æ¥è¦è
æå°å®å
¨çæ°´å¹³ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+#| "important.html\">as I've advocated since 1983</a>, is the first step in "
+#| "taking control of our digital lives, and that includes preventing "
+#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
+#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
+#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
+#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
+#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
+#| "weaknesses in nonfree software to invade our own computers and routers. "
+#| "Free software gives us control of our own computers, but <a href=\"http://"
+#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
+#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -115,10 +132,10 @@
"surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
"web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
"enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"
-"\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/sep/05/"
+"\">uses</a> and even <a href=\"https://www.theguardian.com/world/2013/sep/05/"
"nsa-gchq-encryption-codes-security\">creates</a> security weaknesses in "
"nonfree software to invade our own computers and routers. Free software "
-"gives us control of our own computers, but <a href=\"http://www.wired.com/"
+"gives us control of our own computers, but <a href=\"https://www.wired.com/"
"opinion/2013/10/149481/\">that won't protect our privacy once we set foot on "
"the Internet</a>."
msgstr ""
@@ -134,8 +151,17 @@
"opinion/2013/10/149481/\">è¿å¹¶ä¸è½å¨æ们ä¸ç½æ¶ä¿æ¤æ们çéç§ã</a>ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
+#| "but it relies on limiting the government's use of our virtual dossiers. "
+#| "That won't suffice to protect whistleblowers if “catching the "
+#| "whistleblower” is grounds for access sufficient to identify him or "
+#| "her. We need to go further."
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
"it relies on limiting the government's use of our virtual dossiers. That "
@@ -165,19 +191,34 @@
"æ§ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "An unnamed U.S. government official ominously told journalists in 2011 "
+#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
+#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
+#| "not subpoena reporters because “We know who you're talking to."
+#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
+#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
+#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
+#| "us that in effect they subpoena all the phone call records of everyone in "
+#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
+#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
+#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
+#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
-"news-media-and-law-summer-2011/lessons-wye-river\">U.S. would not subpoena "
-"reporters because “We know who you're talking to.”</a> Sometimes "
-"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
-"guilty-associated-press\">journalists' phone call records are subpoenaed</a> "
-"to find this out, but Snowden has shown us that in effect they subpoena all "
-"the phone call records of everyone in the U.S., all the time, <a href="
-"\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-"
-"telephone-data-court-order\">from Verizon</a> and <a href=\"http://www."
-"marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-"
-"verizon-2013-06-07\">from other companies too</a>."
+"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
+"lessons-wye-river/\">U.S. would not subpoena reporters because “We "
+"know who you're talking to.”</a> Sometimes <a href=\"https://www."
+"theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-"
+"press\">journalists' phone call records are subpoenaed</a> to find this out, "
+"but Snowden has shown us that in effect they subpoena all the phone call "
+"records of everyone in the U.S., all the time, <a href=\"https://www."
+"theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-"
+"order\">from Verizon</a> and <a href=\"https://www.marketwatch.com/story/nsa-"
+"data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
+"companies too</a>."
msgstr ""
"å¨2011å¹´ï¼æç¾å½æ¿åºå®å幸ç¾ä¹ç¥¸å°åè¯è®°è
<a
href=\"http://www.rcfp.org/"
"browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/"
@@ -191,10 +232,19 @@
"verizon-2013-06-07\">å
¶ä»å
¬å¸</a>ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Opposition and dissident activities need to keep secrets from states that "
+#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
+#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
+#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
+#| "on the pretext that there might be terrorists among them. The point at "
+#| "which surveillance is too much is the point at which the state can find "
+#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
-"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"S. government's <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">systematic practice of infiltrating peaceful dissident groups</a> on the "
"pretext that there might be terrorists among them. The point at which "
"surveillance is too much is the point at which the state can find who spoke "
@@ -211,12 +261,24 @@
msgstr "ä¿¡æ¯ï¼ä¸æ¦è¢«æéï¼å°±ä¼è¢«æ»¥ç¨"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "When people recognize that the level of general surveillance is too high, "
+#| "the first response is to propose limits on access to the accumulated "
+#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
+#| "even supposing that the government obeys the rules. (The NSA has misled "
+#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
+#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
+#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
+#| "once a whistleblower is accused of “espionage,” finding the "
+#| "“spy” will provide an excuse to access the accumulated "
+#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"court, which said it was <a href=\"https://www.wired.com/threatlevel/2013/09/"
"nsa-violations/\">unable to effectively hold the NSA accountable</a>.) "
"Suspicion of a crime will be grounds for access, so once a whistleblower is "
"accused of “espionage,” finding the “spy” will "
@@ -245,9 +307,30 @@
"è¡ä¸º</a>ãè¿äºå¶åº¦æ¬æ¥å°±ä¸æ¯ç¨æ¥è®¤çéµå®çï¼ç¸åï¼å®ä»¬å°±æ¯ä¿¡ä¸ä¿¡ç±ä½
çç«¥è¯ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "In addition, the state's surveillance staff will misuse the data for "
+#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
+#| "surveillance systems to track their lovers</a>—past, present, or "
+#| "wished-for—in a practice called “LOVEINT.” The NSA says "
+#| "it has caught and punished this a few times; we don't know how many other "
+#| "times it wasn't caught. But these events shouldn't surprise us, because "
+#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
+#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
+#| "their access to driver's license records to track down someone "
+#| "attractive</a>, a practice known as “running a plate for a date."
+#| "” This practice has expanded with <a href=\"https://theyarewatching."
+#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
+#| "2016, a prosecutor was accused of forging judges' signatures to get "
+#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
+#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
+#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
+#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
+#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
-"personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
+"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
"world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
"surveillance systems to track their lovers</a>—past, present, or "
"wished-for—in a practice called “LOVEINT.” The NSA says it "
@@ -260,7 +343,7 @@
"expanded with <a href=\"https://theyarewatching.org/issues/risks-increase-"
"once-data-shared\">new digital systems</a>. In 2016, a prosecutor was "
"accused of forging judges' signatures to get authorization to <a href="
-"\"http://gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\"> wiretap someone who was the object of a romantic "
"obsession</a>. The AP knows of <a href=\"https://apnews."
"com/699236946e3140659fff8a2362e16f43\">many other instances in the US</a>."
@@ -280,6 +363,20 @@
"apnews.com/699236946e3140659fff8a2362e16f43\">æ´å¤ç¾å½çå
¶ä»æ¡ä¾</a>ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Surveillance data will always be used for other purposes, even if this is "
+#| "prohibited. Once the data has been accumulated and the state has the "
+#| "possibility of access to it, it can misuse that data in dreadful ways, as "
+#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
+#| "collected-personal-data-will-always-be-used-against-the-citizens/"
+#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
+#| "Japanese_American_internment\">the US</a>, and most recently <a href="
+#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
+#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
+#| "(Turkey's confusion about who had really used the Bylock program only "
+#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
+#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -287,7 +384,7 @@
"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
"personal-data-will-always-be-used-against-the-citizens/\">Europe</a>, <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the US</"
-"a>, and most recently <a href=\"http://www.cbc.ca/news/world/terrifying-how-"
+"a>, and most recently <a href=\"https://www.cbc.ca/news/world/terrifying-how-"
"a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-"
"jail-1.4495021\">Turkey</a>. (Turkey's confusion about who had really used "
"the Bylock program only exacerbated the basic deliberate injustice of "
@@ -315,9 +412,14 @@
"revealed-even-worse-than-first.shtml\">为æ对å½å®¶å·¥ä½çéªå®¢è·å¾</a>ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Governments can easily use massive surveillance capability to <a href="
+#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
-"\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
+"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"æ¿åºå¯ä»¥è½»æ使ç¨å
¶å¼ºå¤§ççæ§è½å<a
href=\"http://www.nytimes.com/2015/06/22/"
@@ -353,10 +455,15 @@
"æ¤æ°ä¸»èªç±——å¦æå®å
¨é纳并永æ ä¾å¤å°æ§è¡ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "However, such legal protections are precarious: as recent history shows, "
+#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
+#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
-"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
+"\"https://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgstr ""
"ç¶èï¼è¿ç§æ³å¾ä¿æ¤æ¯ä¸ç¡®å®çï¼æ£å¦å½ä»£åå²å±ç¤ºçï¼æ³å¾ä¼è¢«åºé¤ï¼è±¡FISAä¿®æ£"
"æ¡ï¼ãç»æ¢æ<a
href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">忽ç¥"
@@ -433,8 +540,20 @@
"a>ï¼è¿ä¹æ¯æ计ç®æ§å¶äº¤ç»äºå«äººï¼å 为è¿è¦æ±ä½ æå
¨é¨ç¸å
³æ°æ®äº¤ç»æå¡å¨ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
+#| "link-is-a-family-member/\">Don't give out their personal information</a> "
+#| "except how to contact them, and never give any web site your list of "
+#| "email or phone contacts. Don't tell a company such as Facebook anything "
+#| "about your friends that they might not wish to publish in a newspaper. "
+#| "Better yet, don't be used by Facebook at all. Reject communication "
+#| "systems that require users to give their real names, even if you are "
+#| "happy to divulge yours, since they pressure other people to surrender "
+#| "their privacy."
msgid ""
-"Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
+"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Don't give out their personal information</a> "
"except how to contact them, and never give any web site your list of email "
@@ -592,20 +711,35 @@
"å°è·åç±å
¬å¸æ¶éçæ°æ®çã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
+#| "corporations</a>. AT&T has saved all its phone call records since "
+#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
+#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
+#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
+#| "does not possess that data, but in practical terms it may as well possess "
+#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
+#| "your-back-government-data-requests-2015\">resisting government data "
+#| "requests to the limited extent they can</a>, but that can only partly "
+#| "compensate for the harm they do to by collecting that data in the first "
+#| "place. In addition, many of those companies misuse the data directly or "
+#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">gotten into the databases of many large Internet "
-"corporations</a>. AT&T has saved all its phone call records since 1987 "
-"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
-"phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> "
-"to search on request. Strictly speaking, the U.S. government does not "
-"possess that data, but in practical terms it may as well possess it. Some "
-"companies are praised for <a href=\"https://www.eff.org/who-has-your-back-"
-"government-data-requests-2015\">resisting government data requests to the "
-"limited extent they can</a>, but that can only partly compensate for the "
-"harm they do to by collecting that data in the first place. In addition, "
-"many of those companies misuse the data directly or provide it to data "
-"brokers."
+"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
+"companies\">gotten into the databases of many large Internet corporations</"
+"a>. AT&T has saved all its phone call records since 1987 and <a href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">makes them available to the DEA</a> to search on "
+"request. Strictly speaking, the U.S. government does not possess that "
+"data, but in practical terms it may as well possess it. Some companies are "
+"praised for <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">resisting government data requests to the limited extent "
+"they can</a>, but that can only partly compensate for the harm they do to by "
+"collecting that data in the first place. In addition, many of those "
+"companies misuse the data directly or provide it to data brokers."
msgstr ""
"NSAï¼éè¿PRISM<sup><a href=\"#TransNote7\">7</a></sup>ï¼å¯ä»¥<a href="
"\"https://www.commondreams.org/headline/2013/08/23-2\">è¿å
¥è®¸å¤å¤§åç½ç»éå¢ç"
@@ -647,15 +781,27 @@
"ç§æ¿ç”åªæ¯è¿åéç§çåå£èéä¿æ¤éç§çæ¿è¯ºã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We could correct both problems by adopting a system of anonymous "
+#| "payments—anonymous for the payer, that is. (We don't want to help "
+#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
+#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
+#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
+#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
+#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
+#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
+#| "Taler</a>. Now we need only suitable business arrangements, and for the "
+#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
-"payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
-"through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there are "
-"efforts to develop ways to pay anonymously with Bitcoin. However, "
-"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"payee dodge taxes.) <a href=\"https://www.wired.com/opinion/2013/05/lets-"
+"cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though there "
+"are efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"https://www.wired.com/wired/archive/2.12/emoney_pr."
"html\">digital cash was first developed in the 1980s</a>; the GNU software "
-"for doing this is called <a href=\"http://taler.net/\">GNU Taler</a>. Now "
+"for doing this is called <a href=\"https://taler.net/\">GNU Taler</a>. Now "
"we need only suitable business arrangements, and for the state not to "
"obstruct them."
msgstr ""
@@ -668,10 +814,16 @@
"è¦åéçåä¸è§åï¼ä»¥åæ¿åºä¸è¦é»æ è¿äºè§åã"
#. type: Content of: <div><div><p>
-msgid ""
-"Another possible method for anonymous payments would use <a href=\"https://"
-"stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid phone "
-"cards</a>. It is less convenient, but very easy to implement."
+#, fuzzy
+#| msgid ""
+#| "Another possible method for anonymous payments would use <a href="
+#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
+#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
+#| "implement."
+msgid ""
+"Another possible method for anonymous payments would use <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
+"less convenient, but very easy to implement."
msgstr ""
"å¦ä¸ä¸ªå¿åä»æ¬¾çå¯è½æ¹æ³æ¯ä½¿ç¨<a
href=\"https://stallman.org/articles/"
"anonymous-payments-thru-phones.html\">é¢ä»æ¬¾çµè¯å¡</a>ãå®è½ç¶ä¸å¤ªæ¹ä¾¿ï¼ä½æ¯"
@@ -798,18 +950,31 @@
msgstr "é对é讯档æ¡ç解è¯"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Internet service providers and telephone companies keep extensive data on "
+#| "their users' contacts (browsing, phone calls, etc). With mobile phones, "
+#| "they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+#| "protection-malte-spitz\">record the user's physical location</a>. They "
+#| "keep these dossiers for a long time: over 30 years, in the case of AT&"
+#| "T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/"
+#| "the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-"
+#| "become-qs-activity-trackers/\">record the user's body activities</a>. It "
+#| "appears that the <a href=\"https://www.aclu.org/blog/national-security-"
+#| "technology-and-liberty/it-sure-sounds-nsa-tracking-your-location\">NSA "
+#| "collects cell phone location data</a> in bulk."
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
-"protection-malte-spitz\">record the user's physical location</a>. They keep "
-"these dossiers for a long time: over 30 years, in the case of AT&T. "
-"Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
-"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
-"activity-trackers/\">record the user's body activities</a>. It appears that "
-"the <a href=\"https://www.aclu.org/blog/national-security-technology-and-"
-"liberty/it-sure-sounds-nsa-tracking-your-location\">NSA collects cell phone "
-"location data</a> in bulk."
+"they also <a href=\"https://web.archive.org/web/20210312235125/http://www."
+"zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\">record the "
+"user's physical location</a>. They keep these dossiers for a long time: "
+"over 30 years, in the case of AT&T. Soon they will even <a href="
+"\"https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-"
+"iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\">record "
+"the user's body activities</a>. It appears that the <a href=\"https://www."
+"aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-"
+"tracking-your-location\">NSA collects cell phone location data</a> in bulk."
msgstr ""
"ç½ç»æå¡ååçµè¯å
¬å¸ä¿çå
¶ç¨æ·ç大éæ°æ®ï¼æµè§è®°å½ãéè¯è®°å½ççï¼ã对移å¨çµ"
"è¯ç¨æ·ï¼ä»ä»¬è¿ä¼<a
href=\"http://www.zeit.de/digital/datenschutz/2011-03/"
@@ -833,10 +998,22 @@
"令ç对象ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This solution is not entirely satisfactory, because it won't physically "
+#| "stop the government from collecting all the information immediately as it "
+#| "is generated—which is what the <a href=\"http://www.guardian.co.uk/"
+#| "world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
+#| "some or all phone companies</a>. We would have to rely on prohibiting "
+#| "that by law. However, that would be better than the current situation, "
+#| "where the relevant law (the PAT RIOT Act) does not clearly prohibit the "
+#| "practice. In addition, if the government did resume this sort of "
+#| "surveillance, it would not get data about everyone's phone calls made "
+#| "prior to that time."
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"generated—which is what the <a href=\"https://www.guardian.co.uk/"
"world/2013/jun/06/nsa-phone-records-verizon-court-order\">U.S. does with "
"some or all phone companies</a>. We would have to rely on prohibiting that "
"by law. However, that would be better than the current situation, where the "
@@ -890,6 +1067,20 @@
"è¦è
å°±ä¸å¤ªå¯è½ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Individuals with special state-granted power, such as police, forfeit "
+#| "their right to privacy and must be monitored. (In fact, police have "
+#| "their own jargon term for perjury, “<a href=\"https://en.wikipedia."
+#| "org/w/index.php?title=Police_perjury&oldid=552608302\">testilying</a>,"
+#| "” since they do it so frequently, particularly about protesters and "
+#| "<a href=\"https://web.archive.org/web/20131025014556/http://"
+#| "photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-"
+#| "days-becoming-pinac-partner/\"> photographers</a>.) One city in "
+#| "California that required police to wear video cameras all the time found "
+#| "<a href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-"
+#| "surveillance-police-edition\">their use of force fell by 60%</a>. The "
+#| "ACLU is in favor of this."
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
@@ -899,7 +1090,7 @@
"\"https://web.archive.org/web/20131025014556/http://photographyisnotacrime."
"com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"
"\"> photographers</a>.) One city in California that required police to wear "
-"video cameras all the time found <a href=\"http://www.motherjones.com/kevin-"
+"video cameras all the time found <a href=\"https://www.motherjones.com/kevin-"
"drum/2013/08/ubiquitous-surveillance-police-edition\">their use of force "
"fell by 60%</a>. The ACLU is in favor of this."
msgstr ""
@@ -914,12 +1105,23 @@
"è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ãACLUï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://web.archive.org/web/20171019220057/http://action."
+#| "citizen.org/p/dia/action3/common/public/?action_KEY=12266\">Corporations "
+#| "are not people, and not entitled to human rights</a>. It is legitimate "
+#| "to require businesses to publish the details of processes that might "
+#| "cause chemical, biological, nuclear, fiscal, computational (e.g., <a href="
+#| "\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
+#| "hazards to society, to whatever level is needed for public well-being. "
+#| "The danger of these operations (consider the BP oil spill, the Fukushima "
+#| "meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
msgid ""
"<a href=\"https://web.archive.org/web/20171019220057/http://action.citizen."
"org/p/dia/action3/common/public/?action_KEY=12266\">Corporations are not "
"people, and not entitled to human rights</a>. It is legitimate to require "
"businesses to publish the details of processes that might cause chemical, "
-"biological, nuclear, fiscal, computational (e.g., <a href=\"http://"
+"biological, nuclear, fiscal, computational (e.g., <a href=\"https://"
"DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) hazards to "
"society, to whatever level is needed for public well-being. The danger of "
"these operations (consider the BP oil spill, the Fukushima meltdowns, and "
@@ -1028,9 +1230,7 @@
"ç³»æ¹æ³</a>èç³»èªç±è½¯ä»¶åºéä¼ï¼FSFï¼ãæå
³å¤±æé¾æ¥æå
¶ä»é误å建议ï¼è¯·åéé®ä»¶"
"å°<a href=\"mailto:webmasters@gnu.org\"><webmasters@gnu.org></a>ã"
-#
-#
-#
+# TODO: submitting -> contributing.
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -1038,22 +1238,29 @@
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:web-translators@gnu.org">
#. <web-translators@gnu.org></a>.</p>
-#. <p>For information on coordinating and submitting translations of
+#. <p>For information on coordinating and contributing translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Please see the <a href=\"/server/standards/README.translations.html"
+#| "\">Translations README</a> for information on coordinating and "
+#| "contributing translations of this article."
msgid ""
"Please see the <a href=\"/server/standards/README.translations.html"
-"\">Translations README</a> for information on coordinating and submitting "
+"\">Translations README</a> for information on coordinating and contributing "
"translations of this article."
msgstr ""
-"è¥æ¨æ³ç¿»è¯æ¬æï¼è¯·åç<a
href=\"/server/standards/README.translations.html\">"
-"ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã"
+"请åè <a
href=\"/server/standards/README.translations.html\">ç¿»è¯è¯´æ</a> äº"
+"解æå
³åè°åæ交æç« ç¿»è¯çä¿¡æ¯ã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
-msgstr "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+msgid ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+msgstr ""
+"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
#. type: Content of: <div><p>
msgid ""
@@ -1077,8 +1284,17 @@
msgid "Updated:"
msgstr "æåæ´æ°ï¼"
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
-msgstr ""
-"Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard Stallman"
+#
+#
+#
+#~ msgid ""
+#~ "Please see the <a href=\"/server/standards/README.translations.html"
+#~ "\">Translations README</a> for information on coordinating and submitting "
+#~ "translations of this article."
+#~ msgstr ""
+#~ "è¥æ¨æ³ç¿»è¯æ¬æï¼è¯·åç<a
href=\"/server/standards/README.translations.html"
+#~ "\">ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã"
+
+#~ msgid "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
+#~ msgstr ""
+#~ "Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy/po surveillance-vs-democracy.es....,
GNUN <=