[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po surveillance-vs-democracy.fr.po
From: |
Therese Godefroy |
Subject: |
www/philosophy/po surveillance-vs-democracy.fr.po |
Date: |
Sat, 3 Jul 2021 08:17:41 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 21/07/03 08:17:41
Modified files:
philosophy/po : surveillance-vs-democracy.fr.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.fr.po?cvsroot=www&r1=1.138&r2=1.139
Patches:
Index: surveillance-vs-democracy.fr.po
===================================================================
RCS file: /webcvs/www/www/philosophy/po/surveillance-vs-democracy.fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- surveillance-vs-democracy.fr.po 3 Jul 2021 12:04:56 -0000 1.138
+++ surveillance-vs-democracy.fr.po 3 Jul 2021 12:17:41 -0000 1.139
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
"POT-Creation-Date: 2021-07-03 07:56+0000\n"
-"PO-Revision-Date: 2021-07-03 11:07+0200\n"
+"PO-Revision-Date: 2021-07-03 14:17+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
"Language: fr\n"
@@ -128,32 +128,6 @@
"d'alerte se sentent en sécurité."
#. type: Content of: <div><div><p>
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">as I've
-# | advocated since 1983</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance. We can't trust
-# | nonfree software; the NSA <a
-# |
href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">uses</a>
-# | and even <a
-# |
href=\"http{+s+}://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">creates</a>
-# | security weaknesses in nonfree software to invade our own computers and
-# | routers. Free software gives us control of our own computers, but <a
-# | href=\"http{+s+}://www.wired.com/opinion/2013/10/149481/\">that won't
-# | protect our privacy once we set foot on the Internet</a>.
-#, fuzzy
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\">as I've advocated since 1983</a>, is the first step in "
-#| "taking control of our digital lives, and that includes preventing "
-#| "surveillance. We can't trust nonfree software; the NSA <a href=\"https://"
-#| "web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-"
-#| "enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index."
-#| "htm\">uses</a> and even <a href=\"http://www.theguardian.com/world/2013/"
-#| "sep/05/nsa-gchq-encryption-codes-security\">creates</a> security "
-#| "weaknesses in nonfree software to invade our own computers and routers. "
-#| "Free software gives us control of our own computers, but <a href=\"http://"
-#| "www.wired.com/opinion/2013/10/149481/\">that won't protect our privacy "
-#| "once we set foot on the Internet</a>."
msgid ""
"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
"important.html\">as I've advocated since 1983</a>, is the first step in "
@@ -174,7 +148,7 @@
"prévention de la surveillance. Nous ne pouvons faire confiance aux logiciels
"
"non libres ; la NSA <a href=\"https://web.archive.org/web/20130622044225/"
"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-"ever-trust-microsoft-again/index.htm\">utilise</a> et même <a href=\"http://"
+"ever-trust-microsoft-again/index.htm\">utilise</a> et même <a
href=\"https://"
"www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"
"\">crée</a> des failles de sécurité dans des logiciels non libres afin "
"d'envahir nos ordinateurs et nos routeurs. Le logiciel libre nous donne le "
@@ -183,22 +157,6 @@
"où nous mettons les pieds sur Internet</a>."
#. type: Content of: <div><div><p>
-# | <a
-# |
href=\"http{+s+}://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill\">Bipartisan
-# | legislation to “curtail the domestic surveillance powers”</a>
-# | in the U.S. is being drawn up, but it relies on limiting the government's
-# | use of our virtual dossiers. That won't suffice to protect whistleblowers
-# | if “catching the whistleblower” is grounds for access
-# | sufficient to identify him or her. We need to go further.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
-#| "patriot-act-author-bill\">Bipartisan legislation to “curtail the "
-#| "domestic surveillance powers”</a> in the U.S. is being drawn up, "
-#| "but it relies on limiting the government's use of our virtual dossiers. "
-#| "That won't suffice to protect whistleblowers if “catching the "
-#| "whistleblower” is grounds for access sufficient to identify him or "
-#| "her. We need to go further."
msgid ""
"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
@@ -208,7 +166,7 @@
"whistleblower” is grounds for access sufficient to identify him or "
"her. We need to go further."
msgstr ""
-"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"<a href=\"https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
"patriot-act-author-bill\">Une législation bipartisane ayant pour but de "
"« limiter les pouvoirs de surveillance sur le territoire national »</a>
est "
"en cours d'élaboration aux Ãtats-Unis, mais elle le fait en limitant "
@@ -235,35 +193,6 @@
"delà de ce que peut supporter la démocratie."
#. type: Content of: <div><div><p>
-# | An unnamed U.S. government official ominously told journalists in 2011
-# | that the <a
-# |
[-href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S.-]
-# |
{+href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/\">U.S.+}
-# | would not subpoena reporters because “We know who you're talking
-# | to.”</a> Sometimes <a
-# |
href=\"http{+s+}://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists'
-# | phone call records are subpoenaed</a> to find this out, but Snowden has
-# | shown us that in effect they subpoena all the phone call records of
-# | everyone in the U.S., all the time, <a
-# |
href=\"https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order\">from
-# | Verizon</a> and <a
-# |
href=\"http{+s+}://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\">from
-# | other companies too</a>.
-#, fuzzy
-#| msgid ""
-#| "An unnamed U.S. government official ominously told journalists in 2011 "
-#| "that the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-"
-#| "media-law/news-media-and-law-summer-2011/lessons-wye-river\">U.S. would "
-#| "not subpoena reporters because “We know who you're talking to."
-#| "”</a> Sometimes <a href=\"http://www.theguardian.com/media/2013/"
-#| "sep/24/yemen-leak-sachtleben-guilty-associated-press\">journalists' phone "
-#| "call records are subpoenaed</a> to find this out, but Snowden has shown "
-#| "us that in effect they subpoena all the phone call records of everyone in "
-#| "the U.S., all the time, <a href=\"https://www.theguardian.com/world/"
-#| "interactive/2013/jun/06/verizon-telephone-data-court-order\">from "
-#| "Verizon</a> and <a href=\"http://www.marketwatch.com/story/nsa-data-"
-#| "mining-digs-into-networks-beyond-verizon-2013-06-07\">from other "
-#| "companies too</a>."
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
"the <a href=\"https://www.rcfp.org/journals/news-media-and-law-summer-2011/"
@@ -279,38 +208,21 @@
"companies too</a>."
msgstr ""
"En 2011, un représentant anonyme du gouvernement américain a fait une "
-"déclaration inquiétante à des journalistes, à savoir que <a
href=\"http://"
+"déclaration inquiétante à des journalistes, à savoir que <a
href=\"https://"
"www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-"
"summer-2011/lessons-wye-river\">les Ãtats-Unis n'assigneraient pas de "
"reporter à comparaître parce que « nous savons avec qui vous parlezÂ
»</a>. "
-"Parfois, pour avoir ces renseignements, <a href=\"http://www.theguardian.com/"
-"media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">ils "
+"Parfois, pour avoir ces renseignements, <a href=\"https://www.theguardian."
+"com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\">ils "
"obtiennent les relevés téléphoniques de journalistes par injonction "
"judiciaire</a>, mais Snowden nous a montré qu'en réalité ils adressent des
"
"injonctions en permanence <a href=\"https://www.theguardian.com/world/"
"interactive/2013/jun/06/verizon-telephone-data-court-order\">Ã Verizon</a> "
-"et <a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-"
+"et <a href=\"https://www.marketwatch.com/story/nsa-data-mining-digs-into-"
"networks-beyond-verizon-2013-06-07\">aux autres opérateurs</a>, pour tous "
"les relevés téléphoniques de chaque résident."
#. type: Content of: <div><div><p>
-# | Opposition and dissident activities need to keep secrets from states that
-# | are willing to play dirty tricks on them. The ACLU has demonstrated the
-# | U.S. government's <a
-# | href=\"http{+s+}://www.aclu.org/files/assets/Spyfiles_2_0.pdf\">systematic
-# | practice of infiltrating peaceful dissident groups</a> on the pretext that
-# | there might be terrorists among them. The point at which surveillance is
-# | too much is the point at which the state can find who spoke to a known
-# | journalist or a known dissident.
-#, fuzzy
-#| msgid ""
-#| "Opposition and dissident activities need to keep secrets from states that "
-#| "are willing to play dirty tricks on them. The ACLU has demonstrated the "
-#| "U.S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0."
-#| "pdf\">systematic practice of infiltrating peaceful dissident groups</a> "
-#| "on the pretext that there might be terrorists among them. The point at "
-#| "which surveillance is too much is the point at which the state can find "
-#| "who spoke to a known journalist or a known dissident."
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
@@ -324,7 +236,7 @@
"leurs secrets des Ãtats qui cherchent à leur faire des coups tordus.
L'<abbr "
"title=\"American Civil Liberties Union\">ACLU</abbr><a id=\"TransNote2-rev\" "
"href=\"#TransNote2\"><sup>b</sup></a> a démontré que le gouvernement des "
-"Ãtats-Unis <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"Ãtats-Unis <a href=\"https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
"\">infiltrait systématiquement les groupes dissidents pacifiques</a> sous "
"prétexte qu'il pouvait y avoir des terroristes parmi eux. La surveillance "
"devient trop importante quand l'Ãtat peut trouver qui a parlé à une
personne "
@@ -335,28 +247,6 @@
msgstr "L'information, une fois collectée, sera utilisée à de mauvaises
fins"
#. type: Content of: <div><div><p>
-# | When people recognize that the level of general surveillance is too high,
-# | the first response is to propose limits on access to the accumulated data.
-# | That sounds nice, but it won't fix the problem, not even slightly, even
-# | supposing that the government obeys the rules. (The NSA has misled the
-# | FISA court, which said it was <a
-# |
href=\"http{+s+}://www.wired.com/threatlevel/2013/09/nsa-violations/\">unable
-# | to effectively hold the NSA accountable</a>.) Suspicion of a crime will be
-# | grounds for access, so once a whistleblower is accused of
-# | “espionage,” finding the “spy” will provide an
-# | excuse to access the accumulated material.
-#, fuzzy
-#| msgid ""
-#| "When people recognize that the level of general surveillance is too high, "
-#| "the first response is to propose limits on access to the accumulated "
-#| "data. That sounds nice, but it won't fix the problem, not even slightly, "
-#| "even supposing that the government obeys the rules. (The NSA has misled "
-#| "the FISA court, which said it was <a href=\"http://www.wired.com/"
-#| "threatlevel/2013/09/nsa-violations/\">unable to effectively hold the NSA "
-#| "accountable</a>.) Suspicion of a crime will be grounds for access, so "
-#| "once a whistleblower is accused of “espionage,” finding the "
-#| "“spy” will provide an excuse to access the accumulated "
-#| "material."
msgid ""
"When people recognize that the level of general surveillance is too high, "
"the first response is to propose limits on access to the accumulated data. "
@@ -375,7 +265,7 @@
"gouvernement respecte la loi (la NSA a trompé la cour fédérale de la <abbr
"
"title=\"Foreign Intelligence Surveillance Act\">FISA</abbr>,<a id="
"\"TransNote3-rev\" href=\"#TransNote3\"><sup>c</sup></a> et cette dernière a
"
-"affirmé <a href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/"
+"affirmé <a href=\"https://www.wired.com/threatlevel/2013/09/nsa-violations/"
"\">être incapable, dans les faits, de lui demander des comptes</a>). "
"Soupçonner un délit est un motif suffisant pour avoir accès aux données, "
"donc une fois qu'un lanceur d'alerte est accusé d'« espionnage »,
trouver un "
@@ -400,47 +290,6 @@
"un conte de fées que nous pouvons croire si cela nous chante."
#. type: Content of: <div><div><p>
-# | In addition, the state's surveillance staff will misuse the data for
-# | personal reasons. Some NSA agents <a
-# |
href=\"http{+s+}://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used
-# | U.S. surveillance systems to track their lovers</a>—past, present,
-# | or wished-for—in a practice called “LOVEINT.” The NSA
-# | says it has caught and punished this a few times; we don't know how many
-# | other times it wasn't caught. But these events shouldn't surprise us,
-# | because police have long <a
-# |
href=\"https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used
-# | their access to driver's license records to track down someone
-# | attractive</a>, a practice known as “running a plate for a
-# | date.” This practice has expanded with <a
-# |
href=\"https://theyarewatching.org/issues/risks-increase-once-data-shared\">new
-# | digital systems</a>. In 2016, a prosecutor was accused of forging judges'
-# | signatures to get authorization to <a
-# |
href=\"http{+s+}://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933\">
-# | wiretap someone who was the object of a romantic obsession</a>. The AP
-# | knows of <a
-# | href=\"https://apnews.com/699236946e3140659fff8a2362e16f43\">many other
-# | instances in the US</a>.
-#, fuzzy
-#| msgid ""
-#| "In addition, the state's surveillance staff will misuse the data for "
-#| "personal reasons. Some NSA agents <a href=\"http://www.theguardian.com/"
-#| "world/2013/aug/24/nsa-analysts-abused-surveillance-systems\">used U.S. "
-#| "surveillance systems to track their lovers</a>—past, present, or "
-#| "wished-for—in a practice called “LOVEINT.” The NSA says "
-#| "it has caught and punished this a few times; we don't know how many other "
-#| "times it wasn't caught. But these events shouldn't surprise us, because "
-#| "police have long <a href=\"https://web.archive.org/web/20160401102120/"
-#| "http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I\">used "
-#| "their access to driver's license records to track down someone "
-#| "attractive</a>, a practice known as “running a plate for a date."
-#| "” This practice has expanded with <a href=\"https://theyarewatching."
-#| "org/issues/risks-increase-once-data-shared\">new digital systems</a>. In "
-#| "2016, a prosecutor was accused of forging judges' signatures to get "
-#| "authorization to <a href=\"http://gizmodo.com/government-officials-cant-"
-#| "stop-spying-on-their-crushes-1789490933\"> wiretap someone who was the "
-#| "object of a romantic obsession</a>. The AP knows of <a href=\"https://"
-#| "apnews.com/699236946e3140659fff8a2362e16f43\">many other instances in the "
-#| "US</a>."
msgid ""
"In addition, the state's surveillance staff will misuse the data for "
"personal reasons. Some NSA agents <a href=\"https://www.theguardian.com/"
@@ -463,7 +312,7 @@
msgstr ""
"De plus, le personnel chargé de la surveillance d'Ãtat a l'habitude de "
"détourner les données à des fins personnelles. Des agents de la NSA ont <a
"
-"href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-"
+"href=\"https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-"
"surveillance-systems\">utilisé les systèmes de surveillance américains
pour "
"suivre à la trace leurs petit(e)s ami(e)s</a> â passés, présents, ou "
"espérés, selon une pratique nommée « LOVEINT ». La NSA affirme avoir
détecté "
@@ -476,39 +325,14 @@
"sous les termes de « choper une plaque pour un rencard ». Cette pratique "
"s'est amplifiée avec les <a href=\"https://theyarewatching.org/issues/risks-"
"increase-once-data-shared\">nouveaux systèmes numériques</a>. En 2016, un "
-"procureur a été accusé d'imiter la signature d'un juge pour <a
href=\"http://"
-"gizmodo.com/government-officials-cant-stop-spying-on-their-"
+"procureur a été accusé d'imiter la signature d'un juge pour <a href="
+"\"https://gizmodo.com/government-officials-cant-stop-spying-on-their-"
"crushes-1789490933\">mettre sur écoute une personne qui faisait l'objet "
"d'une obsession romantique</a>. Associated Press a répertorié <a href="
"\"https://apnews.com/699236946e3140659fff8a2362e16f43\">beaucoup d'autres "
"cas aux Ãtats-Unis</a>."
#. type: Content of: <div><div><p>
-# | Surveillance data will always be used for other purposes, even if this is
-# | prohibited. Once the data has been accumulated and the state has the
-# | possibility of access to it, it can misuse that data in dreadful ways, as
-# | shown by examples from <a
-# |
href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/\">Europe</a>,
-# | <a href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\">the
-# | US</a>, and most recently <a
-# |
href=\"http{+s+}://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>.
-# | (Turkey's confusion about who had really used the Bylock program only
-# | exacerbated the basic deliberate injustice of arbitrarily punishing people
-# | for having used it.)
-#, fuzzy
-#| msgid ""
-#| "Surveillance data will always be used for other purposes, even if this is "
-#| "prohibited. Once the data has been accumulated and the state has the "
-#| "possibility of access to it, it can misuse that data in dreadful ways, as "
-#| "shown by examples from <a href=\"http://falkvinge.net/2012/03/17/"
-#| "collected-personal-data-will-always-be-used-against-the-citizens/"
-#| "\">Europe</a>, <a href=\"https://en.wikipedia.org/wiki/"
-#| "Japanese_American_internment\">the US</a>, and most recently <a href="
-#| "\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-"
-#| "code-put-thousands-of-innocent-turks-in-jail-1.4495021\">Turkey</a>. "
-#| "(Turkey's confusion about who had really used the Bylock program only "
-#| "exacerbated the basic deliberate injustice of arbitrarily punishing "
-#| "people for having used it.)"
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
@@ -529,7 +353,7 @@
"net/2012/03/17/collected-personal-data-will-always-be-used-against-the-"
"citizens/\">en Europe</a>, <a href=\"https://fr.wikipedia.org/wiki/"
"Internement_des_Nippo-Am%C3%A9ricains\">aux Ãtats-Unis</a> et plus
récemment "
-"<a href=\"http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-"
+"<a href=\"https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-"
"computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021\">en "
"Turquie</a> (la confusion des autorités turques sur l'identité des
personnes "
"ayant vraiment utilisé le programme ByLock n'a fait qu'exacerber l'injustice
"
@@ -551,21 +375,13 @@
"revealed-even-worse-than-first.shtml\">au service d'Ãtats hostiles</a>."
#. type: Content of: <div><div><p>
-# | Governments can easily use massive surveillance capability to <a
-# |
href=\"http{+s+}://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html\">subvert
-# | democracy directly</a>.
-#, fuzzy
-#| msgid ""
-#| "Governments can easily use massive surveillance capability to <a href="
-#| "\"http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
-#| "blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgid ""
"Governments can easily use massive surveillance capability to <a href="
"\"https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-"
"blamed-for-wiretapping-scandal.html\">subvert democracy directly</a>."
msgstr ""
"Les gouvernements peuvent facilement faire usage de leur énorme capacité de
"
-"surveillance pour <a href=\"http://www.nytimes.com/2015/06/22/world/europe/"
+"surveillance pour <a href=\"https://www.nytimes.com/2015/06/22/world/europe/"
"macedonia-government-is-blamed-for-wiretapping-scandal.html\">corrompre la "
"démocratie directement</a>."
@@ -605,14 +421,6 @@
"exception, Ã tout jamais."
#. type: Content of: <div><div><p>
-# | However, such legal protections are precarious: as recent history shows,
-# | they can be repealed (as in the FISA Amendments Act), suspended, or <a
-# | href=\"http{+s+}://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>.
-#, fuzzy
-#| msgid ""
-#| "However, such legal protections are precarious: as recent history shows, "
-#| "they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-#| "href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\">ignored</a>."
msgid ""
"However, such legal protections are precarious: as recent history shows, "
"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
@@ -620,7 +428,7 @@
msgstr ""
"Toutefois, ces protections juridiques sont précaires : comme nous l'ont "
"montré les récents événements, ils peuvent être abrogés (comme dans la
loi "
-"dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"http://www."
+"dite <cite>FISA Amendments Act</cite>), suspendus ou <a href=\"https://www."
"nytimes.com/2009/04/16/us/16nsa.html\">ignorés</a>."
#. type: Content of: <div><div><p>
@@ -711,27 +519,6 @@
"fournir toutes les données pertinentes au serveur de l'entreprise."
#. type: Content of: <div><div><p>
-# | Protect your friends' and acquaintances' privacy, too. <a
-# |
href=\"http{+s+}://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/\">Don't
-# | give out their personal information</a> except how to contact them, and
-# | never give any web site your list of email or phone contacts. Don't tell
-# | a company such as Facebook anything about your friends that they might not
-# | wish to publish in a newspaper. Better yet, don't be used by Facebook at
-# | all. Reject communication systems that require users to give their real
-# | names, even if you are happy to divulge yours, since they pressure other
-# | people to surrender their privacy.
-#, fuzzy
-#| msgid ""
-#| "Protect your friends' and acquaintances' privacy, too. <a href=\"http://"
-#| "bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
-#| "link-is-a-family-member/\">Don't give out their personal information</a> "
-#| "except how to contact them, and never give any web site your list of "
-#| "email or phone contacts. Don't tell a company such as Facebook anything "
-#| "about your friends that they might not wish to publish in a newspaper. "
-#| "Better yet, don't be used by Facebook at all. Reject communication "
-#| "systems that require users to give their real names, even if you are "
-#| "happy to divulge yours, since they pressure other people to surrender "
-#| "their privacy."
msgid ""
"Protect your friends' and acquaintances' privacy, too. <a href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
@@ -743,7 +530,7 @@
"require users to give their real names, even if you are happy to divulge "
"yours, since they pressure other people to surrender their privacy."
msgstr ""
-"Protégez aussi la vie privée de vos amis et connaissances. <a
href=\"http://"
+"Protégez aussi la vie privée de vos amis et connaissances. <a
href=\"https://"
"bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-"
"link-is-a-family-member/\">Ne divulguez pas leurs informations personnelles</"
"a>, sauf la manière de les contacter, et ne donnez jamais à aucun site
votre "
@@ -929,35 +716,6 @@
"de l'Ãtat."
#. type: Content of: <div><div><p>
-# | The NSA, through PRISM, has <a
-# | [-href=\"https://www.commondreams.org/headline/2013/08/23-2\">gotten-]
-# |
{+href=\"https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies\">gotten+}
-# | into the databases of many large Internet corporations</a>. AT&T has
-# | saved all its phone call records since 1987 and <a
-# |
href=\"http{+s+}://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0\">makes
-# | them available to the DEA</a> to search on request. Strictly speaking,
-# | the U.S. government does not possess that data, but in practical terms it
-# | may as well possess it. Some companies are praised for <a
-# |
href=\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">resisting
-# | government data requests to the limited extent they can</a>, but that can
-# | only partly compensate for the harm they do to by collecting that data in
-# | the first place. In addition, many of those companies misuse the data
-# | directly or provide it to data brokers.
-#, fuzzy
-#| msgid ""
-#| "The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
-#| "headline/2013/08/23-2\">gotten into the databases of many large Internet "
-#| "corporations</a>. AT&T has saved all its phone call records since "
-#| "1987 and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-"
-#| "vast-phone-trove-eclipsing-nsas.html?_r=0\">makes them available to the "
-#| "DEA</a> to search on request. Strictly speaking, the U.S. government "
-#| "does not possess that data, but in practical terms it may as well possess "
-#| "it. Some companies are praised for <a href=\"https://www.eff.org/who-has-"
-#| "your-back-government-data-requests-2015\">resisting government data "
-#| "requests to the limited extent they can</a>, but that can only partly "
-#| "compensate for the harm they do to by collecting that data in the first "
-#| "place. In addition, many of those companies misuse the data directly or "
-#| "provide it to data brokers."
msgid ""
"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
"news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-"
@@ -973,21 +731,21 @@
"collecting that data in the first place. In addition, many of those "
"companies misuse the data directly or provide it to data brokers."
msgstr ""
-"Depuis PRISM, <a href=\"https://www.commondreams.org/"
-"headline/2013/08/23-2\">la NSA a un accès direct aux bases de données de "
-"nombreuses grandes sociétés d'Internet</a>. AT&T conserve tous les "
-"relevés téléphoniques depuis 1987 et <a href=\"http://www.nytimes."
-"com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?"
-"_r=0\">les met à la disposition de la <abbr title=\"Drug Enforcement Agency"
-"\">DEA</abbr></a> sur demande, pour ses recherches. Aux Ãtats-Unis, l'Ãtat "
-"fédéral ne possède pas ces données au sens strict, mais en pratique c'est
"
-"tout comme. Certaines entreprises reçoivent des éloges pour <a href="
-"\"https://www.eff.org/who-has-your-back-government-data-requests-2015\">leur "
-"résistance (dans la mesure limitée de leurs moyens) aux requêtes du "
-"gouvernement concernant ces données</a>, mais cela ne peut compenser que "
-"partiellement le mal qu'elles font au départ en récoltant ces données. De "
-"plus, beaucoup de ces entreprises en font elle-mêmes mauvais usage, ou bien "
-"les fournissent à des courtiers en données."
+"Depuis PRISM, <a href=\"https://www.commondreams.org/news/2013/08/23/latest-"
+"docs-show-financial-ties-between-nsa-and-internet-companies\">la NSA a un "
+"accès direct aux bases de données de nombreuses grandes sociétés
d'Internet</"
+"a>. AT&T conserve tous les relevés téléphoniques depuis 1987 et <a
href="
+"\"https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-"
+"eclipsing-nsas.html?_r=0\">les met à la disposition de la <abbr title=\"Drug
"
+"Enforcement Agency\">DEA</abbr></a> sur demande, pour ses recherches. Aux "
+"Ãtats-Unis, l'Ãtat fédéral ne possède pas ces données au sens strict,
mais "
+"en pratique c'est tout comme. Certaines entreprises reçoivent des éloges "
+"pour <a href=\"https://www.eff.org/who-has-your-back-government-data-"
+"requests-2015\">leur résistance (dans la mesure limitée de leurs moyens)
aux "
+"requêtes du gouvernement concernant ces données</a>, mais cela ne peut "
+"compenser que partiellement le mal qu'elles font au départ en récoltant ces
"
+"données. De plus, beaucoup de ces entreprises en font elle-mêmes mauvais "
+"usage, ou bien les fournissent à des courtiers en données."
#. type: Content of: <div><div><p>
msgid ""
@@ -1028,29 +786,6 @@
"violer celle-ci qu'un engagement à la respecter."
#. type: Content of: <div><div><p>
-# | We could correct both problems by adopting a system of anonymous
-# | payments—anonymous for the payer, that is. (We don't want to help
-# | the payee dodge taxes.) <a
-# |
href=\"http{+s+}://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\">Bitcoin
-# | is not anonymous</a>, though there are efforts to develop ways to pay
-# | anonymously with Bitcoin. However, technology for <a
-# |
href=\"http{+s+}://www.wired.com/wired/archive/2.12/emoney_pr.html\">digital
-# | cash was first developed in the 1980s</a>; the GNU software for doing this
-# | is called <a href=\"http{+s+}://taler.net/\">GNU Taler</a>. Now we need
-# | only suitable business arrangements, and for the state not to obstruct
-# | them.
-#, fuzzy
-#| msgid ""
-#| "We could correct both problems by adopting a system of anonymous "
-#| "payments—anonymous for the payer, that is. (We don't want to help "
-#| "the payee dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/"
-#| "lets-cut-through-the-bitcoin-hype/\">Bitcoin is not anonymous</a>, though "
-#| "there are efforts to develop ways to pay anonymously with Bitcoin. "
-#| "However, technology for <a href=\"http://www.wired.com/wired/archive/2.12/"
-#| "emoney_pr.html\">digital cash was first developed in the 1980s</a>; the "
-#| "GNU software for doing this is called <a href=\"http://taler.net/\">GNU "
-#| "Taler</a>. Now we need only suitable business arrangements, and for the "
-#| "state not to obstruct them."
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want to help the "
@@ -1066,35 +801,24 @@
"Nous pourrions remédier à ces deux problèmes en adoptant un système de "
"paiement anonyme â anonyme pour l'émetteur du paiement, s'entend (aider le
"
"bénéficiaire à échapper à l'impôt n'est pas notre objectif). <a href="
-"\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"
+"\"https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"
"\">Bitcoin n'est pas anonyme</a>, bien que des efforts soient faits pour "
"développer des moyens de payer anonymement avec des bitcoins. Cependant, la "
-"technologie de la <a href=\"http://www.wired.com/wired/archive/2.12/"
+"technologie de la <a href=\"https://www.wired.com/wired/archive/2.12/"
"emoney_pr.html\">monnaie électronique remonte aux années 80</a> ; le "
-"logiciel GNU qui la met en Åuvre s'appelle <a href=\"http://taler.net/\">GNU
"
-"Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont d'accords "
-"commerciaux adaptés et que l'Ãtat n'y fasse pas obstruction."
+"logiciel GNU qui la met en Åuvre s'appelle <a href=\"https://taler.net/"
+"\">GNU Taler</a>. Tout ce dont nous avons besoin maintenant, ce sont "
+"d'accords commerciaux adaptés et que l'Ãtat n'y fasse pas obstruction."
#. type: Content of: <div><div><p>
-# | Another possible method for anonymous payments would use <a
-# |
[-href=\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">prepaid-]
-# | {+href=\"/philosophy/phone-anonymous-payment.html\">prepaid+} phone
-# | cards</a>. It is less convenient, but very easy to implement.
-#, fuzzy
-#| msgid ""
-#| "Another possible method for anonymous payments would use <a href="
-#| "\"https://stallman.org/articles/anonymous-payments-thru-phones.html"
-#| "\">prepaid phone cards</a>. It is less convenient, but very easy to "
-#| "implement."
msgid ""
"Another possible method for anonymous payments would use <a href=\"/"
"philosophy/phone-anonymous-payment.html\">prepaid phone cards</a>. It is "
"less convenient, but very easy to implement."
msgstr ""
-"Une autre méthode possible de paiement anonyme fait usage de <a href="
-"\"https://stallman.org/articles/anonymous-payments-thru-phones.html\">cartes "
-"téléphoniques prépayées</a>. Elle est moins pratique, mais très facile Ã
"
-"mettre en Åuvre."
+"Une autre méthode possible de paiement anonyme fait usage de <a href=\"/"
+"philosophy/phone-anonymous-payment.html\">cartes téléphoniques
prépayées</"
+"a>. Elle est moins pratique, mais très facile à mettre en Åuvre."
#. type: Content of: <div><div><p>
msgid ""