www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy/po surveillance-vs-democracy.fr.po


From: Therese Godefroy
Subject: www/philosophy/po surveillance-vs-democracy.fr.po
Date: Sat, 3 Jul 2021 08:17:41 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 21/07/03 08:17:41

Modified files:
        philosophy/po  : surveillance-vs-democracy.fr.po 

Log message:
        Update.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.138&r2=1.139

Patches:
Index: surveillance-vs-democracy.fr.po
===================================================================
RCS file: /webcvs/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- surveillance-vs-democracy.fr.po     3 Jul 2021 12:04:56 -0000       1.138
+++ surveillance-vs-democracy.fr.po     3 Jul 2021 12:17:41 -0000       1.139
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
 "POT-Creation-Date: 2021-07-03 07:56+0000\n"
-"PO-Revision-Date: 2021-07-03 11:07+0200\n"
+"PO-Revision-Date: 2021-07-03 14:17+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
 "Language: fr\n"
@@ -128,32 +128,6 @@
 "d'alerte se sentent en sécurité."
 
 #. type: Content of: <div><div><p>
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">as I've
-# | advocated since 1983</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance.  We can't trust
-# | nonfree software; the NSA <a
-# | 
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>
-# | and even <a
-# | 
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
-# | security weaknesses in nonfree software to invade our own computers and
-# | routers.  Free software gives us control of our own computers, but <a
-# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
-# | protect our privacy once we set foot on the Internet</a>.
-#, fuzzy
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\">as I've advocated since 1983</a>, is the first step in "
-#| "taking control of our digital lives, and that includes preventing "
-#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"https://";
-#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-";
-#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
-#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/";
-#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
-#| "weaknesses in nonfree software to invade our own computers and routers.  "
-#| "Free software gives us control of our own computers, but <a href=\"http://";
-#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
-#| "once we set foot on the Internet</a>."
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -174,7 +148,7 @@
 "prévention de la surveillance. Nous ne pouvons faire confiance aux logiciels 
"
 "non libres ; la NSA <a href=\"https://web.archive.org/web/20130622044225/";
 "http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-";
-"ever-trust-microsoft-again/index.htm\">utilise</a> et même <a href=\"http://";
+"ever-trust-microsoft-again/index.htm\">utilise</a> et même <a 
href=\"https://";
 "www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"
 "\">crée</a> des failles de sécurité dans des logiciels non libres afin "
 "d'envahir nos ordinateurs et nos routeurs. Le logiciel libre nous donne le "
@@ -183,22 +157,6 @@
 "où nous mettons les pieds sur Internet</a>."
 
 #. type: Content of: <div><div><p>
-# | <a
-# | 
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
-# | legislation to &ldquo;curtail the domestic surveillance powers&rdquo;</a>
-# | in the U.S. is being drawn up, but it relies on limiting the government's
-# | use of our virtual dossiers.  That won't suffice to protect whistleblowers
-# | if &ldquo;catching the whistleblower&rdquo; is grounds for access
-# | sufficient to identify him or her.  We need to go further.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
-#| "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
-#| "domestic surveillance powers&rdquo;</a> in the U.S. is being drawn up, "
-#| "but it relies on limiting the government's use of our virtual dossiers.  "
-#| "That won't suffice to protect whistleblowers if &ldquo;catching the "
-#| "whistleblower&rdquo; is grounds for access sufficient to identify him or "
-#| "her.  We need to go further."
 msgid ""
 "<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Bipartisan legislation to &ldquo;curtail the "
@@ -208,7 +166,7 @@
 "whistleblower&rdquo; is grounds for access sufficient to identify him or "
 "her.  We need to go further."
 msgstr ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-";
 "patriot-act-author-bill\">Une législation bipartisane ayant pour but de "
 "« limiter les pouvoirs de surveillance sur le territoire national »</a> 
est "
 "en cours d'élaboration aux États-Unis, mais elle le fait en limitant "
@@ -235,35 +193,6 @@
 "delà de ce que peut supporter la démocratie."
 
 #. type: Content of: <div><div><p>
-# | An unnamed U.S. government official ominously told journalists in 2011
-# | that the <a
-# | 
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\";>U.S.-]
-# | 
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\";>U.S.+}
-# | would not subpoena reporters because &ldquo;We know who you're talking
-# | to.&rdquo;</a> Sometimes <a
-# | 
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
-# | phone call records are subpoenaed</a> to find this out, but Snowden has
-# | shown us that in effect they subpoena all the phone call records of
-# | everyone in the U.S., all the time, <a
-# | 
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\";>from
-# | Verizon</a> and <a
-# | 
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
-# | other companies too</a>.
-#, fuzzy
-#| msgid ""
-#| "An unnamed U.S. government official ominously told journalists in 2011 "
-#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-";
-#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
-#| "not subpoena reporters because &ldquo;We know who you're talking to."
-#| "&rdquo;</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/";
-#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
-#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
-#| "us that in effect they subpoena all the phone call records of everyone in "
-#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/";
-#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
-#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-";
-#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
-#| "companies too</a>."
 msgid ""
 "An unnamed U.S. government official ominously told journalists in 2011 that "
 "the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/";
@@ -279,38 +208,21 @@
 "companies too</a>."
 msgstr ""
 "En 2011, un représentant anonyme du gouvernement américain a fait une "
-"déclaration inquiétante à des journalistes, à savoir que <a 
href=\"http://";
+"déclaration inquiétante à des journalistes, à savoir que <a 
href=\"https://";
 "www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-"
 "summer-2011/lessons-wye-river\">les États-Unis n'assigneraient pas de "
 "reporter à comparaître parce que « nous savons avec qui vous parlez 
»</a>. "
-"Parfois, pour avoir ces renseignements, <a href=\"http://www.theguardian.com/";
-"media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">ils "
+"Parfois, pour avoir ces renseignements, <a href=\"https://www.theguardian.";
+"com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">ils "
 "obtiennent les relevés téléphoniques de journalistes par injonction "
 "judiciaire</a>, mais Snowden nous a montré qu'en réalité ils adressent des 
"
 "injonctions en permanence <a href=\"https://www.theguardian.com/world/";
 "interactive/2013/jun/06/verizon-telephone-data-court-order\">à Verizon</a> "
-"et <a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-";
+"et <a href=\"https://www.marketwatch.com/story/nsa-data-mining-digs-into-";
 "networks-beyond-verizon-2013-06-07\">aux autres opérateurs</a>, pour tous "
 "les relevés téléphoniques de chaque résident."
 
 #. type: Content of: <div><div><p>
-# | Opposition and dissident activities need to keep secrets from states that
-# | are willing to play dirty tricks on them.  The ACLU has demonstrated the
-# | U.S. government's <a
-# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
-# | practice of infiltrating peaceful dissident groups</a> on the pretext that
-# | there might be terrorists among them.  The point at which surveillance is
-# | too much is the point at which the state can find who spoke to a known
-# | journalist or a known dissident.
-#, fuzzy
-#| msgid ""
-#| "Opposition and dissident activities need to keep secrets from states that "
-#| "are willing to play dirty tricks on them.  The ACLU has demonstrated the "
-#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.";
-#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
-#| "on the pretext that there might be terrorists among them.  The point at "
-#| "which surveillance is too much is the point at which the state can find "
-#| "who spoke to a known journalist or a known dissident."
 msgid ""
 "Opposition and dissident activities need to keep secrets from states that "
 "are willing to play dirty tricks on them.  The ACLU has demonstrated the U."
@@ -324,7 +236,7 @@
 "leurs secrets des États qui cherchent à leur faire des coups tordus. 
L'<abbr "
 "title=\"American Civil Liberties Union\">ACLU</abbr><a id=\"TransNote2-rev\" "
 "href=\"#TransNote2\"><sup>b</sup></a> a démontré que le gouvernement des "
-"États-Unis <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
+"États-Unis <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";
 "\">infiltrait systématiquement les groupes dissidents pacifiques</a> sous "
 "prétexte qu'il pouvait y avoir des terroristes parmi eux. La surveillance "
 "devient trop importante quand l'État peut trouver qui a parlé à une 
personne "
@@ -335,28 +247,6 @@
 msgstr "L'information, une fois collectée, sera utilisée à de mauvaises 
fins"
 
 #. type: Content of: <div><div><p>
-# | When people recognize that the level of general surveillance is too high,
-# | the first response is to propose limits on access to the accumulated data.
-# |  That sounds nice, but it won't fix the problem, not even slightly, even
-# | supposing that the government obeys the rules.  (The NSA has misled the
-# | FISA court, which said it was <a
-# | 
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
-# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
-# | grounds for access, so once a whistleblower is accused of
-# | &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
-# | excuse to access the accumulated material.
-#, fuzzy
-#| msgid ""
-#| "When people recognize that the level of general surveillance is too high, "
-#| "the first response is to propose limits on access to the accumulated "
-#| "data.  That sounds nice, but it won't fix the problem, not even slightly, "
-#| "even supposing that the government obeys the rules.  (The NSA has misled "
-#| "the FISA court, which said it was <a href=\"http://www.wired.com/";
-#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
-#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
-#| "once a whistleblower is accused of &ldquo;espionage,&rdquo; finding the "
-#| "&ldquo;spy&rdquo; will provide an excuse to access the accumulated "
-#| "material."
 msgid ""
 "When people recognize that the level of general surveillance is too high, "
 "the first response is to propose limits on access to the accumulated data.  "
@@ -375,7 +265,7 @@
 "gouvernement respecte la loi (la NSA a trompé la cour fédérale de la <abbr 
"
 "title=\"Foreign Intelligence Surveillance Act\">FISA</abbr>,<a id="
 "\"TransNote3-rev\" href=\"#TransNote3\"><sup>c</sup></a> et cette dernière a 
"
-"affirmé <a href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/";
+"affirmé <a href=\"https://www.wired.com/threatlevel/2013/09/nsa-violations/";
 "\">être incapable, dans les faits, de lui demander des comptes</a>). "
 "Soupçonner un délit est un motif suffisant pour avoir accès aux données, "
 "donc une fois qu'un lanceur d'alerte est accusé d'« espionnage », 
trouver un "
@@ -400,47 +290,6 @@
 "un conte de fées que nous pouvons croire si cela nous chante."
 
 #. type: Content of: <div><div><p>
-# | In addition, the state's surveillance staff will misuse the data for
-# | personal reasons.  Some NSA agents <a
-# | 
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
-# | U.S. surveillance systems to track their lovers</a>&mdash;past, present,
-# | or wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA
-# | says it has caught and punished this a few times; we don't know how many
-# | other times it wasn't caught.  But these events shouldn't surprise us,
-# | because police have long <a
-# | 
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used
-# | their access to driver's license records to track down someone
-# | attractive</a>, a practice known as &ldquo;running a plate for a
-# | date.&rdquo; This practice has expanded with <a
-# | 
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\";>new
-# | digital systems</a>.  In 2016, a prosecutor was accused of forging judges'
-# | signatures to get authorization to <a
-# | 
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
-# | wiretap someone who was the object of a romantic obsession</a>. The AP
-# | knows of <a
-# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>many other
-# | instances in the US</a>.
-#, fuzzy
-#| msgid ""
-#| "In addition, the state's surveillance staff will misuse the data for "
-#| "personal reasons.  Some NSA agents <a href=\"http://www.theguardian.com/";
-#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
-#| "surveillance systems to track their lovers</a>&mdash;past, present, or "
-#| "wished-for&mdash;in a practice called &ldquo;LOVEINT.&rdquo; The NSA says "
-#| "it has caught and punished this a few times; we don't know how many other "
-#| "times it wasn't caught.  But these events shouldn't surprise us, because "
-#| "police have long <a href=\"https://web.archive.org/web/20160401102120/";
-#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\";>used "
-#| "their access to driver's license records to track down someone "
-#| "attractive</a>, a practice known as &ldquo;running a plate for a date."
-#| "&rdquo; This practice has expanded with <a href=\"https://theyarewatching.";
-#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>.  In "
-#| "2016, a prosecutor was accused of forging judges' signatures to get "
-#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-";
-#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
-#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://";
-#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
-#| "US</a>."
 msgid ""
 "In addition, the state's surveillance staff will misuse the data for "
 "personal reasons.  Some NSA agents <a href=\"https://www.theguardian.com/";
@@ -463,7 +312,7 @@
 msgstr ""
 "De plus, le personnel chargé de la surveillance d'État a l'habitude de "
 "détourner les données à des fins personnelles. Des agents de la NSA ont <a 
"
-"href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-";
+"href=\"https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-";
 "surveillance-systems\">utilisé les systèmes de surveillance américains 
pour "
 "suivre à la trace leurs petit(e)s ami(e)s</a> – passés, présents, ou "
 "espérés, selon une pratique nommée « LOVEINT ». La NSA affirme avoir 
détecté "
@@ -476,39 +325,14 @@
 "sous les termes de « choper une plaque pour un rencard ». Cette pratique "
 "s'est amplifiée avec les <a href=\"https://theyarewatching.org/issues/risks-";
 "increase-once-data-shared\">nouveaux systèmes numériques</a>. En 2016, un "
-"procureur a été accusé d'imiter la signature d'un juge pour <a 
href=\"http://";
-"gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"procureur a été accusé d'imiter la signature d'un juge pour <a href="
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-";
 "crushes-1789490933\">mettre sur écoute une personne qui faisait l'objet "
 "d'une obsession romantique</a>. Associated Press a répertorié <a href="
 "\"https://apnews.com/699236946e3140659fff8a2362e16f43\";>beaucoup d'autres "
 "cas aux États-Unis</a>."
 
 #. type: Content of: <div><div><p>
-# | Surveillance data will always be used for other purposes, even if this is
-# | prohibited.  Once the data has been accumulated and the state has the
-# | possibility of access to it, it can misuse that data in dreadful ways, as
-# | shown by examples from <a
-# | 
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\";>Europe</a>,
-# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\";>the
-# | US</a>, and most recently <a
-# | 
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
-# |  (Turkey's confusion about who had really used the Bylock program only
-# | exacerbated the basic deliberate injustice of arbitrarily punishing people
-# | for having used it.)
-#, fuzzy
-#| msgid ""
-#| "Surveillance data will always be used for other purposes, even if this is "
-#| "prohibited.  Once the data has been accumulated and the state has the "
-#| "possibility of access to it, it can misuse that data in dreadful ways, as "
-#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/";
-#| "collected-personal-data-will-always-be-used-against-the-citizens/"
-#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/";
-#| "Japanese_American_internment\">the US</a>, and most recently <a href="
-#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-";
-#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.  "
-#| "(Turkey's confusion about who had really used the Bylock program only "
-#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
-#| "people for having used it.)"
 msgid ""
 "Surveillance data will always be used for other purposes, even if this is "
 "prohibited.  Once the data has been accumulated and the state has the "
@@ -529,7 +353,7 @@
 "net/2012/03/17/collected-personal-data-will-always-be-used-against-the-"
 "citizens/\">en Europe</a>, <a href=\"https://fr.wikipedia.org/wiki/";
 "Internement_des_Nippo-Am%C3%A9ricains\">aux États-Unis</a> et plus 
récemment "
-"<a href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-";
+"<a href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-";
 "computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">en "
 "Turquie</a> (la confusion des autorités turques sur l'identité des 
personnes "
 "ayant vraiment utilisé le programme ByLock n'a fait qu'exacerber l'injustice 
"
@@ -551,21 +375,13 @@
 "revealed-even-worse-than-first.shtml\">au service d'États hostiles</a>."
 
 #. type: Content of: <div><div><p>
-# | Governments can easily use massive surveillance capability to <a
-# | 
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
-# | democracy directly</a>.
-#, fuzzy
-#| msgid ""
-#| "Governments can easily use massive surveillance capability to <a href="
-#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
-#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgid ""
 "Governments can easily use massive surveillance capability to <a href="
 "\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-";
 "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
 msgstr ""
 "Les gouvernements peuvent facilement faire usage de leur énorme capacité de 
"
-"surveillance pour <a href=\"http://www.nytimes.com/2015/06/22/world/europe/";
+"surveillance pour <a href=\"https://www.nytimes.com/2015/06/22/world/europe/";
 "macedonia-government-is-blamed-for-wiretapping-scandal.html\">corrompre la "
 "démocratie directement</a>."
 
@@ -605,14 +421,6 @@
 "exception, à tout jamais."
 
 #. type: Content of: <div><div><p>
-# | However, such legal protections are precarious: as recent history shows,
-# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
-# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
-#, fuzzy
-#| msgid ""
-#| "However, such legal protections are precarious: as recent history shows, "
-#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\";>ignored</a>."
 msgid ""
 "However, such legal protections are precarious: as recent history shows, "
 "they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -620,7 +428,7 @@
 msgstr ""
 "Toutefois, ces protections juridiques sont précaires : comme nous l'ont "
 "montré les récents événements, ils peuvent être abrogés (comme dans la 
loi "
-"dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"http://www.";
+"dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"https://www.";
 "nytimes.com/2009/04/16/us/16nsa.html\">ignorés</a>."
 
 #. type: Content of: <div><div><p>
@@ -711,27 +519,6 @@
 "fournir toutes les données pertinentes au serveur de l'entreprise."
 
 #. type: Content of: <div><div><p>
-# | Protect your friends' and acquaintances' privacy, too.  <a
-# | 
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
-# | give out their personal information</a> except how to contact them, and
-# | never give any web site your list of email or phone contacts.  Don't tell
-# | a company such as Facebook anything about your friends that they might not
-# | wish to publish in a newspaper.  Better yet, don't be used by Facebook at
-# | all.  Reject communication systems that require users to give their real
-# | names, even if you are happy to divulge yours, since they pressure other
-# | people to surrender their privacy.
-#, fuzzy
-#| msgid ""
-#| "Protect your friends' and acquaintances' privacy, too.  <a href=\"http://";
-#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
-#| "link-is-a-family-member/\">Don't give out their personal information</a> "
-#| "except how to contact them, and never give any web site your list of "
-#| "email or phone contacts.  Don't tell a company such as Facebook anything "
-#| "about your friends that they might not wish to publish in a newspaper.  "
-#| "Better yet, don't be used by Facebook at all.  Reject communication "
-#| "systems that require users to give their real names, even if you are "
-#| "happy to divulge yours, since they pressure other people to surrender "
-#| "their privacy."
 msgid ""
 "Protect your friends' and acquaintances' privacy, too.  <a href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -743,7 +530,7 @@
 "require users to give their real names, even if you are happy to divulge "
 "yours, since they pressure other people to surrender their privacy."
 msgstr ""
-"Protégez aussi la vie privée de vos amis et connaissances. <a 
href=\"http://";
+"Protégez aussi la vie privée de vos amis et connaissances. <a 
href=\"https://";
 "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
 "link-is-a-family-member/\">Ne divulguez pas leurs informations personnelles</"
 "a>, sauf la manière de les contacter, et ne donnez jamais à aucun site 
votre "
@@ -929,35 +716,6 @@
 "de l'État."
 
 #. type: Content of: <div><div><p>
-# | The NSA, through PRISM, has <a
-# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\";>gotten-]
-# | 
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\";>gotten+}
-# | into the databases of many large Internet corporations</a>.  AT&amp;T has
-# | saved all its phone call records since 1987 and <a
-# | 
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
-# | them available to the DEA</a> to search on request.  Strictly speaking,
-# | the U.S.  government does not possess that data, but in practical terms it
-# | may as well possess it.  Some companies are praised for <a
-# | 
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>resisting
-# | government data requests to the limited extent they can</a>, but that can
-# | only partly compensate for the harm they do to by collecting that data in
-# | the first place.  In addition, many of those companies misuse the data
-# | directly or provide it to data brokers.
-#, fuzzy
-#| msgid ""
-#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
-#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
-#| "corporations</a>.  AT&amp;T has saved all its phone call records since "
-#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-";
-#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
-#| "DEA</a> to search on request.  Strictly speaking, the U.S.  government "
-#| "does not possess that data, but in practical terms it may as well possess "
-#| "it.  Some companies are praised for <a href=\"https://www.eff.org/who-has-";
-#| "your-back-government-data-requests-2015\">resisting government data "
-#| "requests to the limited extent they can</a>, but that can only partly "
-#| "compensate for the harm they do to by collecting that data in the first "
-#| "place.  In addition, many of those companies misuse the data directly or "
-#| "provide it to data brokers."
 msgid ""
 "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/";
 "news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
@@ -973,21 +731,21 @@
 "collecting that data in the first place.  In addition, many of those "
 "companies misuse the data directly or provide it to data brokers."
 msgstr ""
-"Depuis PRISM, <a href=\"https://www.commondreams.org/";
-"headline/2013/08/23-2\">la NSA a un accès direct aux bases de données de "
-"nombreuses grandes sociétés d'Internet</a>. AT&amp;T conserve tous les "
-"relevés téléphoniques depuis 1987 et <a href=\"http://www.nytimes.";
-"com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?"
-"_r=0\">les met à la disposition de la <abbr title=\"Drug Enforcement Agency"
-"\">DEA</abbr></a> sur demande, pour ses recherches. Aux États-Unis, l'État "
-"fédéral ne possède pas ces données au sens strict, mais en pratique c'est 
"
-"tout comme. Certaines entreprises reçoivent des éloges pour <a href="
-"\"https://www.eff.org/who-has-your-back-government-data-requests-2015\";>leur "
-"résistance (dans la mesure limitée de leurs moyens) aux requêtes du "
-"gouvernement concernant ces données</a>, mais cela ne peut compenser que "
-"partiellement le mal qu'elles font au départ en récoltant ces données. De "
-"plus, beaucoup de ces entreprises en font elle-mêmes mauvais usage, ou bien "
-"les fournissent à des courtiers en données."
+"Depuis PRISM, <a href=\"https://www.commondreams.org/news/2013/08/23/latest-";
+"docs-show-financial-ties-between-nsa-and-internet-companies\">la NSA a un "
+"accès direct aux bases de données de nombreuses grandes sociétés 
d'Internet</"
+"a>. AT&amp;T conserve tous les relevés téléphoniques depuis 1987 et <a 
href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-";
+"eclipsing-nsas.html?_r=0\">les met à la disposition de la <abbr title=\"Drug 
"
+"Enforcement Agency\">DEA</abbr></a> sur demande, pour ses recherches. Aux "
+"États-Unis, l'État fédéral ne possède pas ces données au sens strict, 
mais "
+"en pratique c'est tout comme. Certaines entreprises reçoivent des éloges "
+"pour <a href=\"https://www.eff.org/who-has-your-back-government-data-";
+"requests-2015\">leur résistance (dans la mesure limitée de leurs moyens) 
aux "
+"requêtes du gouvernement concernant ces données</a>, mais cela ne peut "
+"compenser que partiellement le mal qu'elles font au départ en récoltant ces 
"
+"données. De plus, beaucoup de ces entreprises en font elle-mêmes mauvais "
+"usage, ou bien les fournissent à des courtiers en données."
 
 #. type: Content of: <div><div><p>
 msgid ""
@@ -1028,29 +786,6 @@
 "violer celle-ci qu'un engagement à la respecter."
 
 #. type: Content of: <div><div><p>
-# | We could correct both problems by adopting a system of anonymous
-# | payments&mdash;anonymous for the payer, that is.  (We don't want to help
-# | the payee dodge taxes.)  <a
-# | 
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
-# | is not anonymous</a>, though there are efforts to develop ways to pay
-# | anonymously with Bitcoin.  However, technology for <a
-# | 
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
-# | cash was first developed in the 1980s</a>; the GNU software for doing this
-# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>.  Now we need
-# | only suitable business arrangements, and for the state not to obstruct
-# | them.
-#, fuzzy
-#| msgid ""
-#| "We could correct both problems by adopting a system of anonymous "
-#| "payments&mdash;anonymous for the payer, that is.  (We don't want to help "
-#| "the payee dodge taxes.)  <a href=\"http://www.wired.com/opinion/2013/05/";
-#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
-#| "there are efforts to develop ways to pay anonymously with Bitcoin.  "
-#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/";
-#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
-#| "GNU software for doing this is called <a href=\"http://taler.net/\";>GNU "
-#| "Taler</a>.  Now we need only suitable business arrangements, and for the "
-#| "state not to obstruct them."
 msgid ""
 "We could correct both problems by adopting a system of anonymous "
 "payments&mdash;anonymous for the payer, that is.  (We don't want to help the "
@@ -1066,35 +801,24 @@
 "Nous pourrions remédier à ces deux problèmes en adoptant un système de "
 "paiement anonyme – anonyme pour l'émetteur du paiement, s'entend (aider le 
"
 "bénéficiaire à échapper à l'impôt n'est pas notre objectif). <a href="
-"\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";
+"\"https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";
 "\">Bitcoin n'est pas anonyme</a>, bien que des efforts soient faits pour "
 "développer des moyens de payer anonymement avec des bitcoins. Cependant, la "
-"technologie de la <a href=\"http://www.wired.com/wired/archive/2.12/";
+"technologie de la <a href=\"https://www.wired.com/wired/archive/2.12/";
 "emoney_pr.html\">monnaie électronique remonte aux années 80</a> ; le "
-"logiciel GNU qui la met en œuvre s'appelle <a href=\"http://taler.net/\";>GNU 
"
-"Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont d'accords "
-"commerciaux adaptés et que l'État n'y fasse pas obstruction."
+"logiciel GNU qui la met en œuvre s'appelle <a href=\"https://taler.net/";
+"\">GNU Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont "
+"d'accords commerciaux adaptés et que l'État n'y fasse pas obstruction."
 
 #. type: Content of: <div><div><p>
-# | Another possible method for anonymous payments would use <a
-# | 
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>prepaid-]
-# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
-# | cards</a>.  It is less convenient, but very easy to implement.
-#, fuzzy
-#| msgid ""
-#| "Another possible method for anonymous payments would use <a href="
-#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html";
-#| "\">prepaid phone cards</a>.  It is less convenient, but very easy to "
-#| "implement."
 msgid ""
 "Another possible method for anonymous payments would use <a href=\"/"
 "philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>.  It is "
 "less convenient, but very easy to implement."
 msgstr ""
-"Une autre méthode possible de paiement anonyme fait usage de <a href="
-"\"https://stallman.org/articles/anonymous-payments-thru-phones.html\";>cartes "
-"téléphoniques prépayées</a>. Elle est moins pratique, mais très facile à
 "
-"mettre en œuvre."
+"Une autre méthode possible de paiement anonyme fait usage de <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">cartes téléphoniques 
prépayées</"
+"a>. Elle est moins pratique, mais très facile à mettre en œuvre."
 
 #. type: Content of: <div><div><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]