[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/surveillance-vs-democracy.zh-cn....
From: |
GNUN |
Subject: |
www philosophy/surveillance-vs-democracy.zh-cn.... |
Date: |
Tue, 6 Jul 2021 05:33:37 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/06 05:33:36
Modified files:
philosophy : surveillance-vs-democracy.zh-cn.html
philosophy/po : surveillance-vs-democracy.zh-cn-en.html
surveillance-vs-democracy.zh-cn.po
proprietary : proprietary.zh-cn.html
proprietary/po : proprietary.zh-cn-en.html proprietary.zh-cn.po
zh-cn.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.zh-cn.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.zh-cn.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.201&r2=1.202
Patches:
Index: philosophy/surveillance-vs-democracy.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.zh-cn.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/surveillance-vs-democracy.zh-cn.html 18 Dec 2020 07:31:33
-0000 1.24
+++ philosophy/surveillance-vs-democracy.zh-cn.html 6 Jul 2021 09:33:34
-0000 1.25
@@ -1,7 +1,8 @@
<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.zh-cn.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>æ°ä¸»è½å¤æ¿åå¤å°çæ§ï¼ - GNUå·¥ç¨ -
èªç±è½¯ä»¶åºéä¼</title>
@@ -21,7 +22,7 @@
<!--#include virtual="/server/banner.zh-cn.html" -->
<h2 class="center">æ°ä¸»è½å¤æ¿åå¤å°çæ§ï¼</h2>
-<address class="byline center"><a href="http://www.stallman.org/">Richard
Stallman</a> è</address>
+<address class="byline center"><a href="https://www.stallman.org/">Richard
Stallman</a> è</address>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
@@ -56,11 +57,11 @@
å¹´èµ·å°±å¼å§æå¡çé£æ
·</a>ï¼æ¯æ们æ§å¶æ°åçæ´»ç第ä¸æ¥ï¼å
¶ä¸å°±å
æ¬é²æ¢çæ§ãæ们ä¸è½ç¸ä¿¡éèªç±è½¯ä»¶ï¼NSA<sup><a
href="#TransNote1">1</a></sup><a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">å©ç¨</a>çè³<a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">å¶é
</a>éèªç±è½¯ä»¶çå®å
¨å¼±ç¹æ¥å
¥ä¾µæ们ççµèåè·¯ç±å¨ãèªç±è½¯ä»¶è®©æ们è½å¤æ§å¶èªå·±ççµèï¼ä½æ¯<a
-href="http://www.wired.com/opinion/2013/10/149481/">è¿å¹¶ä¸è½å¨æ们ä¸ç½æ¶ä¿æ¤æ们çéç§ã</a>ã</p>
+href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">å¶é
</a>éèªç±è½¯ä»¶çå®å
¨å¼±ç¹æ¥å
¥ä¾µæ们ççµèåè·¯ç±å¨ãèªç±è½¯ä»¶è®©æ们è½å¤æ§å¶èªå·±ççµèï¼ä½æ¯<a
+href="https://www.wired.com/opinion/2013/10/149481/">è¿å¹¶ä¸è½å¨æ们ä¸ç½æ¶ä¿æ¤æ们çéç§ã</a>ã</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">å¨ç¾å½ï¼ä¸¤å
ç«æ³æ¥“éå¶å½å
çæ§æå”</a>æ£å¨è®¡åä¸ï¼ä½æ¯å®ä¾èµäºéå¶æ¿åºä½¿ç¨æ们çèææ¡£æ¡<sup><a
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">å¨ç¾å½ï¼ä¸¤å
ç«æ³æ¥“éå¶å½å
çæ§æå”</a>æ£å¨è®¡åä¸ï¼ä½æ¯å®ä¾èµäºéå¶æ¿åºä½¿ç¨æ们çèææ¡£æ¡<sup><a
href="#TransNote2">2</a></sup>ãå¦æ“æææ¥è¦è
”çåææ¯è·åæ认她/ä»ç足å¤èµæï¼é£ä¹è¿æ
·çç«æ³ä¸è¶³ä»¥ä¿æ¤æ¥è¦è
ãæ们éè¦æ´è¿ä¸æ¥ã</p>
</div>
@@ -70,14 +71,14 @@
<p>å¦ææ¥è¦è
ä¸æ¢æ«é²ç½ªæ¶åè°è¨ï¼æ们就失å»äºå¯¹æ¿åºåå¶åº¦çæåä¸ä¸æ§å¶ãè¿å°±æ¯ä¸ºä»ä¹å
许æ¿åºåç°è°æ¯æ¥åè
ççæ§æ¯è¿åº¦çç槗æ¯æ°ä¸»æ
æ³æ¿åçè¿åº¦çæ§ã</p>
<p>å¨2011å¹´ï¼æç¾å½æ¿åºå®å幸ç¾ä¹ç¥¸å°åè¯è®°è
<a
-href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">ç¾å½æ¿åºä¸ä¼ä¼
å¤æ¥åè
ï¼å 为“æ们ç¥éä½
åè°è°è¿ã”</a>ææ¶ï¼<a
-href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">è®°è
çéè¯è®°å½ä¼è¢«è°å</a>以æ¥æéè¯äººï¼ä½æ¯Snowdenåæ们å±ç¤ºäºå
¶å®ç¾å½ææ人çéè¯è®°å½é½è¢«è°åï¼éæ¶è°åï¼<a
+href="https://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">ç¾å½æ¿åºä¸ä¼ä¼
å¤æ¥åè
ï¼å 为“æ们ç¥éä½
åè°è°è¿ã”</a>ææ¶ï¼<a
+href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">è®°è
çéè¯è®°å½ä¼è¢«è°å</a>以æ¥æéè¯äººï¼ä½æ¯Snowdenåæ们å±ç¤ºäºå
¶å®ç¾å½ææ人çéè¯è®°å½é½è¢«è°åï¼éæ¶è°åï¼<a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">ä»Verizon</a>å<a
-href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">å
¶ä»å
¬å¸</a>ã</p>
+href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">å
¶ä»å
¬å¸</a>ã</p>
<p>å对派åæä¸åè¯ä»¶è
éè¦æå
å½å±çç§å¯ï¼ä»¥é²æ¢æ¿åºå©ç¨ç§å¯å¹²åäºãACLU<sup><a
href="#TransNote3">3</a></sup>å±ç¤ºäºç¾å½æ¿åº<a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">ç³»ç»æ§å
¥ä¾µåå¹³çæä¸åè¯ä»¶è
ç»ç»çæ´»å¨</a>ï¼å
¶åå£å°±æ¯è¿äºç»ç»ä¸å¯è½æææååãçæ§è¿åº¦ç水平就æ¯æ¿åºè½å¤éè¿çæ§åç°è°åè®°è
ææä¸åè¯ä»¶è
è°è¿è¯çæ°´å¹³ã</p>
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">ç³»ç»æ§å
¥ä¾µåå¹³çæä¸åè¯ä»¶è
ç»ç»çæ´»å¨</a>ï¼å
¶åå£å°±æ¯è¿äºç»ç»ä¸å¯è½æææååãçæ§è¿åº¦ç水平就æ¯æ¿åºè½å¤éè¿çæ§åç°è°åè®°è
ææä¸åè¯ä»¶è
è°è¿è¯çæ°´å¹³ã</p>
</div>
<h3 class="subheader">ä¿¡æ¯ï¼ä¸æ¦è¢«æéï¼å°±ä¼è¢«æ»¥ç¨</h3>
@@ -85,16 +86,16 @@
<div class="columns">
<p
id="willbemisused">å½äººä»¬è®¤è¯å°çæ§çæ°´å¹³è¿é«æ¶ï¼ä»ä»¬ç第ä¸ååºæ¯æè®®éå¶è·åæ°æ®ãè¿å¬èµ·æ¥ä¸éï¼ä½ä¸è§£å³é®é¢ï¼ä¸ç¹å¿ä¹ä¸è§£å³é®é¢ï¼å³ä½¿å设æ¿åºä¼éµå®è¿äºæ¡æ¬¾ä¹æ¯ä¸æ
·ãï¼NSA误导äºFISA<sup><a
href="#TransNote4">4</a></sup>æ³åºï¼è¯¥æ³åºè¯´å®<a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">ä¸è½ææå°è®©NSAè´è´£</a>ãï¼å
为æçæ罪就è½å¤æ为è·åæ°æ®ççç±ï¼æ以ä¸æ¦æ¥è¦è
被æ槓ä»äºè°æ¥æ´»å¨ï¼”é£ä¹æç´¢“é´è°”å°±ä¼æ为è·åæ°æ®çåå£ã</p>
+href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">ä¸è½ææå°è®©NSAè´è´£</a>ãï¼å
为æçæ罪就è½å¤æ为è·åæ°æ®ççç±ï¼æ以ä¸æ¦æ¥è¦è
被æ槓ä»äºè°æ¥æ´»å¨ï¼”é£ä¹æç´¢“é´è°”å°±ä¼æ为è·åæ°æ®çåå£ã</p>
<p>å®é
ä¸ï¼æ们ä¸è½ææå½å®¶å
¬å¡äººåä¼éµå®ä½¿ç¨çæ§æ°æ®çå¶åº¦ï¼å³ä½¿ç¼é
åå£ä¹ä¸è¡—å 为ç¾å½çå
¬å¡å<a
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/">å·²ç»å¨ç¨è°è¨æ©çå
¶è¿åå¶åº¦çè¡ä¸º</a>ãè¿äºå¶åº¦æ¬æ¥å°±ä¸æ¯ç¨æ¥è®¤çéµå®çï¼ç¸åï¼å®ä»¬å°±æ¯ä¿¡ä¸ä¿¡ç±ä½
çç«¥è¯ã</p>
<p>å¦å¤ï¼æ¿åºççæ§äººåè¿ä¼å
ç§æ»¥ç¨è¿äºæ°æ®ãæäºNSA人å<a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">使ç¨æ¿åºççæ§ç³»ç»æ¥è¿½è¸ªå
¶æ
人</a>—çè¿å»ãç°å¨æ计å—è¿å¨å®è·µä¸ç§°ä¸º“LOVEINTã”NSA声称å®æ¾æè·åæ©ç½äºå
èµ·æ¤ç±»äºä»¶ï¼æ们并ä¸ç¥éè¿æå¤å°èµ·å¹¶æªæå°ãä½è¿å¹¶ä¸æå¤ï¼å
为ä¸ç´ä»¥æ¥è¦å¯å°±<a
+href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">使ç¨æ¿åºççæ§ç³»ç»æ¥è¿½è¸ªå
¶æ
人</a>—çè¿å»ãç°å¨æ计å—è¿å¨å®è·µä¸ç§°ä¸º“LOVEINTã”NSA声称å®æ¾æè·åæ©ç½äºå
èµ·æ¤ç±»äºä»¶ï¼æ们并ä¸ç¥éè¿æå¤å°èµ·å¹¶æªæå°ãä½è¿å¹¶ä¸æå¤ï¼å
为ä¸ç´ä»¥æ¥è¦å¯å°±<a
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">使ç¨è®¿é®é©¾ç
§è®°å½çæåæ¥è¿½è¸ªè¿·äººç人</a>ï¼è¿å¨å®è·µä¸å«å“æ¥é©¾ç
§çº¦ä¼ã”该è¡ä¸ºè¿éç<a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">æ°çæ°åç³»ç»</a>æ©å¼
ãå¨2016å¹´ï¼æå
¬è¯äººè¢«ææ§ä¼ªé æ³å®ç¾å以è·å<a
-href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">æ线çªå¬ä¸ä¸ªå
¶è¿·æç对象</a>ãAP<sup><a
+href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">æ线çªå¬ä¸ä¸ªå
¶è¿·æç对象</a>ãAP<sup><a
href="#TransNote5">5</a></sup>äºè§£<a
href="https://apnews.com/699236946e3140659fff8a2362e16f43">æ´å¤ç¾å½çå
¶ä»æ¡ä¾</a>ã
</p>
@@ -102,14 +103,14 @@
<p>å³ä½¿ç¦æ¢ï¼çæ§æ°æ®æ»æ¯ä¼ç¨äºå
¶ä»ç®çãä¸æ¦æ°æ®å·²æ¶é并ä¸æ¿åºå¯ä»¥è®¿é®ï¼é£ä¹æ¿åºæå¾å¤æ¶å£çæ¹æ³ä½¿ç¨è¯¥æ°æ®ï¼æ¯å¦<a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">欧洲</a>ã<a
href="https://en.wikipedia.org/wiki/Japanese_American_internment">ç¾å½</a>ï¼ä»¥åæè¿<a
-href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">åè³å
¶</a>çä¾åãï¼åè³å
¶å
³äºè°å¨çæ£ä½¿ç¨Bylockç¨åºçå°æ°ä»
ä»
æ¯æ¶åäºå¯¹ä½¿ç¨è¯¥ç¨åºç人çä»»ææ©ç½è¿ç§ç®åçæ
æä¸å
¬æ£ãï¼
+href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">åè³å
¶</a>çä¾åãï¼åè³å
¶å
³äºè°å¨çæ£ä½¿ç¨Bylockç¨åºçå°æ°ä»
ä»
æ¯æ¶åäºå¯¹ä½¿ç¨è¯¥ç¨åºç人çä»»ææ©ç½è¿ç§ç®åçæ
æä¸å
¬æ£ãï¼
</p>
<p>ç±æ¿åºæ¶éç个人æ°æ®ä¹æå¯è½è¢«éªå®¢éè¿å
¥ä¾µå®å
¨æå¡å¨è·å¾ï¼çè³è¢«<a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">为æ对å½å®¶å·¥ä½çéªå®¢è·å¾</a>ã</p>
<p>æ¿åºå¯ä»¥è½»æ使ç¨å
¶å¼ºå¤§ççæ§è½å<a
-href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">ç´æ¥æ¯çæ°ä¸»</a>ã</p>
+href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">ç´æ¥æ¯çæ°ä¸»</a>ã</p>
<p>对çæ§çå
¨é¢ææ§ä½¿å¾æ¿åºå¯ä»¥å¯¹ä»»ä½äººå¼å±å¤§è§æ¨¡çéé±¼è°æ¥ãè¦ä½¿è¨è®ºåæ°ä¸»å®å
¨ï¼æ们å¿
é¡»éå¶æ¿åºå¯¹çæ§æ°æ®ç访é®ã</p>
</div>
@@ -121,7 +122,7 @@
href="https://necessaryandproportionate.org">ç¦æ¢å¤§è§æ¨¡çæ§ç滥ç¨</a>ãè¿äºååå
æ¬ï¼å¯¹æ¥è¦è
严æ
¼ãæç¡®çæ³å¾ä¿æ¤ï¼ä½ä¸ºç»æï¼è¿äºåå足å¤æ¥ä¿æ¤æ°ä¸»èªç±——å¦æå®å
¨é纳并永æ ä¾å¤å°æ§è¡ã</p>
<p>ç¶èï¼è¿ç§æ³å¾ä¿æ¤æ¯ä¸ç¡®å®çï¼æ£å¦å½ä»£åå²å±ç¤ºçï¼æ³å¾ä¼è¢«åºé¤ï¼è±¡FISAä¿®æ£æ¡ï¼ãç»æ¢æ<a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">忽ç¥</a>ã</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html">忽ç¥</a>ã</p>
<p>åæ¶ï¼æ¶ææ¿å®¢ä¼å¼ç¨æéè¯æ®çæ¡æ¬¾æ¥ä½ä¸ºå
¨é¢çæ§çæ³å¾æ¯æï¼ææè¢å»ï¼å³ä½¿åªæ¯ææ»æå°æ°äººï¼ä¹è½ä½ä¸ºä»ä»¬åæ¥ççç±ã</p>
@@ -142,7 +143,7 @@
href="/philosophy/who-does-that-server-really-serve.html">ç¨è½¯ä»¶ä»£æ¿æå¡</a>ï¼è¿ä¹æ¯æ计ç®æ§å¶äº¤ç»äºå«äººï¼å
为è¿è¦æ±ä½ æå
¨é¨ç¸å
³æ°æ®äº¤ç»æå¡å¨ã</p>
<p>è¯·ä½ ä¹ä¿æ¤æååç人çéç§ã<a
-href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">ä¸è¦æ´é²ä»ä»¬ç个人信æ¯</a>é¤äºå¦ä½èç³»ä»ä»¬ï¼ä¸è¦æé®ä»¶è系人åçµè¯è系人交ç»ä»»ä½ç½ç«ãä¸è¦åè¯è¯¸å¦Facebookè¿æ
·çç½ç«ä½ æå们ä¸æ¿å¨æ¥çº¸ä¸å
¬å¼çäºãæ好就æ¯æ
¹æ¬ä¸è¦ä½¿ç¨Facebookã请æç»ä½¿ç¨è¦æ±å®åçç³»ç»ï¼å³ä½¿ä½ é«å
´å®åï¼ä¹ä¸è¦å æ¤èç»ä»äººçéç§å¸¦æ¥ååã</p>
+href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">ä¸è¦æ´é²ä»ä»¬ç个人信æ¯</a>é¤äºå¦ä½èç³»ä»ä»¬ï¼ä¸è¦æé®ä»¶è系人åçµè¯è系人交ç»ä»»ä½ç½ç«ãä¸è¦åè¯è¯¸å¦Facebookè¿æ
·çç½ç«ä½ æå们ä¸æ¿å¨æ¥çº¸ä¸å
¬å¼çäºãæ好就æ¯æ
¹æ¬ä¸è¦ä½¿ç¨Facebookã请æç»ä½¿ç¨è¦æ±å®åçç³»ç»ï¼å³ä½¿ä½ é«å
´å®åï¼ä¹ä¸è¦å æ¤èç»ä»äººçéç§å¸¦æ¥ååã</p>
<p>èªæä¿æ¤å¾éè¦ï¼ä½æ¯å³ä½¿æ严谨çèªæä¿æ¤ä¹æ
æ³å¨å«äººç设å¤ä¸ä¿æ¤ä½ çéç§ãå½æ们åå
¶ä»äººäº¤æµæè
æµè¿äºåå¸ä¹ä¸æ¶ï¼æ们çéç§ä¾èµäºç¤¾ä¼çå®è·µãæ们å¯ä»¥é¿å
ä¸äºçæ§æ们交æµåæ´»å¨çç³»ç»ï¼ä½æ¯æ æ³é¿å
ææççæ§ç³»ç»ãå¾ææ¾ï¼æ好就æ¯ç»æ¢ææççæ§ï¼é¤äºé对æ³å¾å
许çå«çç¯ã</p>
</div>
@@ -179,7 +180,7 @@
<p>NSAï¼éè¿PRISM<sup><a href="#TransNote7">7</a></sup>ï¼å¯ä»¥<a
href="https://www.commondreams.org/headline/2013/08/23-2">è¿å
¥è®¸å¤å¤§åç½ç»éå¢çæ°æ®åº</a>ãAT&Tä¿åçèª1987年以æ¥ççµè¯è®°å½å¹¶<a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">让DEA<sup><a
+href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">让DEA<sup><a
href="#TransNote8">8</a></sup>ææ</a>æéæ¥è¯¢ã严æ
¼æ¥è¯´ï¼ç¾å½æ¿åºä¸æ¥æè¿äºæ°æ®ï¼ä½å®é
ä¸å®å°±ç®æ¥æè¿äºæ°æ®ãæäºå
¬å¸ç±äº<a
href="https://www.eff.org/who-has-your-back-government-data-requests-2015">å°½éé»æ¡æ¿åºè°åæ°æ®ç请æ±</a>èåå°èµæ¬ï¼ä½æ¯è¿åªè½é¨åè¡¥å¿å
¶é¦å
æ¶éæ°æ®å¸¦æ¥ç伤害ãå¦å¤ï¼å¾å¤æ¤ç±»å
¬å¸èªå·±ä¹ç´æ¥æ»¥ç¨è¿äºæ°æ®æè
åç»æ°æ®æ®å®¢ã</p>
@@ -188,12 +189,12 @@
<p>ç½ç»çæ§å°è¾¾ç®åæ°´å¹³çä¸ä¸ªå¨æºæ¯å¾å¤ç½ç«æ
¹æ®ç¨æ·çæ´»å¨åå¾åå广åï¼å¹¶å
æ¤è·å¾ç»æµåæ¥ãè¿ä½¿å¾åæ¬åªæ¯ä»¤äººè®¨åç—å¯ä»¥å¿½ç¥ç广å—åæäºæ
论æ们æ¯å¦ç¥æé½ä¼é
æ伤害ççæ§ç³»ç»ãç½ç»è´ä¹°ä¹ä¼è·è¸ªç¨æ·ãæ们é½å¾æ¸
楓éç§æ¿ç”åªæ¯è¿åéç§çåå£èéä¿æ¤éç§çæ¿è¯ºã</p>
<p>æ们å¯ä»¥éåå¿åä»æ¬¾çç³»ç»åæ¶æ¹æ£ä»¥ä¸ä¸¤ä¸ªé®é¢—å°±æ¯ä»æ¬¾è
å¿åãï¼æ们并ä¸æ³å¸®å©æ¶æ¬¾äººé¿ç¨ãï¼<a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">æ¯ç¹å¸å¹¶ä¸å¿å</a>ï¼è½ç¶æ人å¼åäºç¨æ¯ç¹å¸å¿åä»æ¬¾çæ¹æ³ãç¶èï¼ææ¯ä¸ï¼<a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">æ°åç°éææ©äº1980年代é¦æ¬¡è¢«å¼å</a>ï¼ææ©å®ç°è¯¥åè½çGNU软件å«å<a
-href="http://taler.net/">GNU
Taler</a>ãç°å¨æ们åªéè¦åéçåä¸è§åï¼ä»¥åæ¿åºä¸è¦é»æ
è¿äºè§åã</p>
+href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">æ¯ç¹å¸å¹¶ä¸å¿å</a>ï¼è½ç¶æ人å¼åäºç¨æ¯ç¹å¸å¿åä»æ¬¾çæ¹æ³ãç¶èï¼ææ¯ä¸ï¼<a
+href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">æ°åç°éææ©äº1980年代é¦æ¬¡è¢«å¼å</a>ï¼ææ©å®ç°è¯¥åè½çGNU软件å«å<a
+href="https://taler.net/">GNU
Taler</a>ãç°å¨æ们åªéè¦åéçåä¸è§åï¼ä»¥åæ¿åºä¸è¦é»æ
è¿äºè§åã</p>
<p>å¦ä¸ä¸ªå¿åä»æ¬¾çå¯è½æ¹æ³æ¯ä½¿ç¨<a
-href="https://stallman.org/articles/anonymous-payments-thru-phones.html">é¢ä»æ¬¾çµè¯å¡</a>ãå®è½ç¶ä¸å¤ªæ¹ä¾¿ï¼ä½æ¯å¾å®¹æå®ç°ã</p>
+href="/philosophy/phone-anonymous-payment.html">é¢ä»æ¬¾çµè¯å¡</a>ãå®è½ç¶ä¸å¤ªæ¹ä¾¿ï¼ä½æ¯å¾å®¹æå®ç°ã</p>
<p>ç½ç«æ¶é个人æ°æ®çå¦ä¸ä¸ªå¨èæ¯å®å
¨æ»å»è
ä¼ä¾µå
¥ï¼è·åæ°æ®å¹¶æ»¥ç¨ä¹ãè¿å
æ¬å®¢æ·ä¿¡ç¨å¡ç详æ
ãå¿åä»æ¬¾ç³»ç»ä¼ç»æè¿ä¸ªå±é©ï¼ç½ç«çå®å
¨æ¼æ´ä¸ä¼ä¼¤å®³å°ä½ ï¼å 为ç½ç«ä¸ç¥éä½ æ¯è°ã</p>
</div>
@@ -221,14 +222,14 @@
<div class="columns">
<p>ç½ç»æå¡ååçµè¯å
¬å¸ä¿çå
¶ç¨æ·ç大éæ°æ®ï¼æµè§è®°å½ãéè¯è®°å½ççï¼ã对移å¨çµè¯ç¨æ·ï¼ä»ä»¬è¿ä¼<a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">è®°å½ç¨æ·çå
·ä½ä½ç½®</a>ãè¿äºæ¡£æ¡ä¼ä¿çå¾é¿æ¶é´ï¼å¯¹AT&Tæ¥è¯´ï¼è¶
è¿30å¹´ãå¨ä¸ä¹
çå°æ¥ä»ä»¬çè³ä¼<a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">è®°å½ç¨æ·ç身ä½å¨ä½</a>ãçèµ·æ¥<a
+href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">è®°å½ç¨æ·çå
·ä½ä½ç½®</a>ãè¿äºæ¡£æ¡ä¼ä¿çå¾é¿æ¶é´ï¼å¯¹AT&Tæ¥è¯´ï¼è¶
è¿30å¹´ãå¨ä¸ä¹
çå°æ¥ä»ä»¬çè³ä¼<a
+href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">è®°å½ç¨æ·ç身ä½å¨ä½</a>ãçèµ·æ¥<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSAä¹ä¼å¤§éæ¶é移å¨çµè¯çä½ç½®ä¿¡æ¯</a>ã</p>
<p>å¨å¶é
æ¤ç±»æ¡£æ¡çç³»ç»ä¸ï¼é讯ä¸è¢«çæ§æ¯ä¸å¯è½çãæ以å¶é
åä¿çè¿äºæ¡£æ¡åºè¯¥æ¯éæ³çãå¿
é¡»ç¦æ¢ç½ç»æä¾ååçµè¯å
¬å¸é¿æ¶é´ä¿çè¿äºä¿¡æ¯ï¼é¤éé对æäºææ³åºå½ä»¤ç对象ã</p>
<p>该解å³æ¹æ¡ä¸å®å
¨ä»¤äººæ»¡æï¼å 为å®æ æ³å®é
é»æ¢æ¿åºå¨æ°æ®äº§çä¹åç«å³è·å¾—è¿æ£æ¯<a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">ç¾å½æ¿åºå¯¹æäºæå
¨é¨çµè¯å
¬å¸çæä½æ为</a>ãæ们è¿æ¯ä¸å¾ä¸ä¾èµæ³å¾æ¥ç¦æ¢è¿ç§è¡ä¸ºãä½æ¯ï¼è¿æ»å¥½è¿ç®åçæ
åµï¼ç¸å
³æ³å¾ï¼PAT
+href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">ç¾å½æ¿åºå¯¹æäºæå
¨é¨çµè¯å
¬å¸çæä½æ为</a>ãæ们è¿æ¯ä¸å¾ä¸ä¾èµæ³å¾æ¥ç¦æ¢è¿ç§è¡ä¸ºãä½æ¯ï¼è¿æ»å¥½è¿ç®åçæ
åµï¼ç¸å
³æ³å¾ï¼PAT
RIOT
Actï¼å¹¶ä¸æç¡®å°ç¦æ¢è¿ç§è¡ä¸ºãå¦å¤ï¼å¦ææ¿åºè¦æ¢å¤çæ§ï¼å®ä¹æ
æ³è·å¾å¨æ¢å¤ä¹åçéè¯è®°å½ã</p>
<p>为äºä¿æ¤ä½
çµåé®ä»¶é讯çéç§ï¼ä¸ä¸ªç®åçå±é¨è§£å³åæ³æ¯ä½
åé讯è
使ç¨ä¸ä¼åå½å°æ¿åºåä½çé®ä»¶æå¡åï¼å¹¶äºç¸ä½¿ç¨å
å¯é讯ãä½æ¯ï¼Ladar
@@ -245,12 +246,12 @@
<a
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/">æå½±è
</a>
æ¶ãï¼å å·çä¸ä¸ªåå¸è¦æ±è¦å¯å
¨ç¨ç©¿æ´å½åæºï¼ç»ææ¯ <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ãACLUï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã</p>
+href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ãACLUï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã</p>
<p><a
href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">ä¼ä¸ä¸æ¯äººï¼å®ä»¬æ²¡æ人æ</a>ãè¦æ±åä¸å
¬å¸å
¬å¼å
¶å¯è½å¯¹ç¤¾ä¼å¯¼è´åå¦ãçç©ãæ
¸ãéèã计ç®ï¼æ¯å¦
<a
-href="http://DefectiveByDesign.org">DRM</a>ï¼ææ¿æ²»ï¼æ¯å¦æ¸¸è¯´ï¼çé£é©çæ´»å¨çç»èæ¯åæ³çï¼å¦æè¿äºé£é©å¯¹å¤§ä¼å©ççå½±åè¾¾å°äºä¸å®çæ°´å¹³ãè¿äºæ´»å¨çå±é©ï¼æ³æ³
+href="https://DefectiveByDesign.org">DRM</a>ï¼ææ¿æ²»ï¼æ¯å¦æ¸¸è¯´ï¼çé£é©çæ´»å¨çç»èæ¯åæ³çï¼å¦æè¿äºé£é©å¯¹å¤§ä¼å©ççå½±åè¾¾å°äºä¸å®çæ°´å¹³ãè¿äºæ´»å¨çå±é©ï¼æ³æ³
BP åæ²¹æ³æ¼ãç¦å²æ ¸çµç«ååºå æ ¸å¿çæ¯å 2008
éèå±æºï¼è¶
è¿äºææè¢å»ã</p>
<p>ä½æ¯ï¼è¨è®ºèªç±å¿
é¡»ä¸åçæ§ï¼å³ä½¿å®æ¯ä»¥åä¸çå½¢å¼åç°çã</p>
@@ -299,7 +300,7 @@
<!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.zh-cn.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>请å°æå
³èªç±è½¯ä»¶åºéä¼ï¼FSFï¼&GNUçä¸è¬æ§é®é¢åéå°<a
@@ -318,12 +319,13 @@
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and contributing translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
-è¥æ¨æ³ç¿»è¯æ¬æï¼è¯·åç<a
-href="/server/standards/README.translations.html">ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã</p>
+æ们尽æ大åªåæ¥æä¾ç²¾ååé«è´¨éçç¿»è¯ï¼ä½é¾å
ä¼åå¨é误åä¸è¶³ãå¦ææ¨å¨è¿æ¹é¢æè¯è®ºæä¸è¬æ§ç建议ï¼è¯·åéè³
<a
+href="mailto:web-translators@gnu.org"><web-translators@gnu.org></a>ã</p><p>å
³äºè¿è¡åè°ä¸æ交翻è¯çæ´å¤ä¿¡æ¯åè§
+<a href="/server/standards/README.translations.html">ãè¯è
æåã</a>ã</p>
</div>
<!-- Regarding copyright, in general, standalone pages (as opposed to
@@ -342,7 +344,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard
Stallman</p>
<p>æ¬é¡µé¢ä½¿ç¨<a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
@@ -353,12 +355,12 @@
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
<b>ç¿»è¯å¢é</b>ï¼<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/"><CTT></a>ï¼2017-2020ã</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/"><CTT></a>ï¼2017-2021ã</div>
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2020/12/18 07:31:33 $
+$Date: 2021/07/06 09:33:34 $
<!-- timestamp end -->
</p>
Index: philosophy/po/surveillance-vs-democracy.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/po/surveillance-vs-democracy.zh-cn-en.html 18 Dec 2020
07:31:33 -0000 1.24
+++ philosophy/po/surveillance-vs-democracy.zh-cn-en.html 6 Jul 2021
09:33:35 -0000 1.25
@@ -1,5 +1,6 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -17,7 +18,7 @@
<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
<address class="byline center">by
-<a href="http://www.stallman.org/">Richard Stallman</a></address>
+<a href="https://www.stallman.org/">Richard Stallman</a></address>
<!-- rms: I deleted the link because of Wired's announced
anti-ad-block system -->
@@ -70,14 +71,14 @@
can't trust nonfree software; the NSA
<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+even <a
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -97,22 +98,22 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+the <a
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+Sometimes <a
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+and <a
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
@@ -128,7 +129,7 @@
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -144,7 +145,7 @@
<p>In addition, the state's surveillance staff will misuse the data
for personal reasons. Some NSA
-agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+agents <a
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -157,7 +158,7 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+to <a
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
@@ -171,7 +172,7 @@
from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
-recently <a
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
+recently <a
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
@@ -183,7 +184,7 @@
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+to <a
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -207,7 +208,7 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -250,7 +251,7 @@
pertinent data to the company's server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+too. <a
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -343,10 +344,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+has <a
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+and <a
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it. Some companies are praised
@@ -376,17 +377,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want to
help the payee dodge
-taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+taxes.) <a
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/">GNU Taler</a>. Now we need
+this is called <a href="https://taler.net/">GNU Taler</a>. Now we need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<p>Another possible method for anonymous payments would
-use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
phone cards</a>. It is less convenient, but very easy to
implement.</p>
@@ -463,10 +464,10 @@
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+also <a
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+even <a
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
the user's body activities</a>. It appears that
the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
collects cell phone location data</a> in bulk.</p>
@@ -479,7 +480,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+the <a
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -520,7 +521,7 @@
photographers</a>.)
One city in California that required police to wear video cameras all
the time
-found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+found <a
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
@@ -528,7 +529,7 @@
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -573,7 +574,7 @@
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -591,13 +592,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and contributing translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
of this article.</p>
</div>
@@ -618,7 +619,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -628,7 +629,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/18 07:31:33 $
+$Date: 2021/07/06 09:33:35 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/surveillance-vs-democracy.zh-cn.po 6 Jul 2021 09:14:14
-0000 1.63
+++ philosophy/po/surveillance-vs-democracy.zh-cn.po 6 Jul 2021 09:33:35
-0000 1.64
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-03 07:56+0000\n"
#. type: Content of: <title>
msgid ""
Index: proprietary/proprietary.zh-cn.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.zh-cn.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/proprietary.zh-cn.html 28 Jun 2021 08:31:54 -0000 1.56
+++ proprietary/proprietary.zh-cn.html 6 Jul 2021 09:33:35 -0000 1.57
@@ -169,6 +169,22 @@
<h3 id="latest">ææ°æ·»å </h3>
<ul class="blurbs">
+ <li id="M202106220">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Peloton å
¬å¸ç产çè·æ¥æºæè¿ <a
+href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/">éè¿è½¯ä»¶å级让人æ
æ³ä½¿ç¨è·æ¥æºçåºæ¬åè½</a>ã该å
¬å¸ç°å¨è®©äººä»¬ä¸ºå·²ç»ä»è´¹çåè½è¿è¡ä¼å注åæ订é
ã</p>
+
+
<p>该è·æ¥æºç软件æ¯ä¸æ软件ï¼å¾å¯è½å¸¦æ强å¶å级çåé¨ãè¿ä»¶äºæ
çæè®å°±æ¯å½ä¸ä¸ªäº§åæå¤é¨ç½ç»éä¿¡çåè½æ¶ï¼é£ä¹ä½ å¿
é¡»è¦æå®å¸¦ææ¶æ软件ã</p>
+
+ <p>请注æï¼è¯¥å
¬å¸è¯´ä»ä»¬ä¼åé软件ï¼è¿æ
·äººä»¬å°±ä¸ç¨å注åæè½ä½¿ç¨è·æ¥æºçåè½ã</p>
+
+ <p>æ¾ç¶ï¼å
¬ä¼çæ¤æ使该å
¬å¸ååºäºè®©æ¥ãå¦ææ们è¦ç¡®ä¿å®å
¨ï¼é£ä¹æ们è¿éè¦å¯¹æ¶æåè½ï¼å
æ¬ä¸æ软件æ´ä½ï¼è¡¨ç¤ºæ¤æï¼è¿ç§æ¤æè¦ä½¿æææå¿çå
¬å¸ä¹å¿åçæ§ã</p>
+ </li>
+
<li id="M202106190">
<!--#set var="DATE" value='<small class="date-tag">
@@ -212,17 +228,6 @@
href="https://www.lifewire.com/wifi-positioning-system-1683343">æ¶é人们çç½ç»è®¿é®å°ç¹å
GPS åæ ï¼å¯ç¨äºç¡®å®äººä»¬ç精确ä½ç½®ï¼ï¼å³ä½¿äººä»¬å
³é GPS
æå¡ä¹æ¯ä¸æ ·</a>ãç¶èä»
ä»
æ¯å¾å¾äººä»¬ç许å¯å¹¶ä¸è½ä½¿è¿ç§è¡ä¸ºåæ³ã</p>
</li>
-
- <li id="M201808131">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2018-08</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data">å³ä½¿äººä»¬å
³éä½ç½®æå¡ï¼ä¹ä¼è¢«è°·æ追踪</a>ï¼è°·æ使ç¨
-Google
Mapsã天æ°æ´æ°åæµè§å¨æç´¢çæ¹å¼ãè°·æåºæ¬ä¸æ¯ç¨ä¸ååºç¨ç使ç¨æ¥è¿½è¸ªäººä»¬ã</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">æ´å¤å
容…</a></p>
@@ -298,7 +303,7 @@
<p class="unprintable"><!-- timestamp start -->
æåæ´æ°ï¼
-$Date: 2021/06/28 08:31:54 $
+$Date: 2021/07/06 09:33:35 $
<!-- timestamp end -->
</p>
Index: proprietary/po/proprietary.zh-cn-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary.zh-cn-en.html 28 Jun 2021 08:31:54 -0000
1.57
+++ proprietary/po/proprietary.zh-cn-en.html 6 Jul 2021 09:33:36 -0000
1.58
@@ -186,6 +186,30 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202106220">
+ <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Peloton company which produces treadmills recently <a
+
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/">locked
+ people out of basic features of people's treadmills by a software
+ update</a>. The company now asks people for a membership/subscription
+ for what people already paid for.</p>
+
+ <p>The software used in the treadmill is proprietary and probably
+ includes back doors to force software updates. It teaches the lesson
+ that if a product talks to external networks, you must expect it to
+ take in new malware.</p>
+
+ <p>Please note that the company behind this product said they
+ are working to reverse the changes so people will no longer need
+ subscription to use the locked feature.</p>
+
+ <p>Apparently public anger made the company back down. If we want that
+ to be our safety, we need to build up the anger against malicious
+ features (and the proprietary software that is their entry path)
+ to the point that even the most powerful companies don't dare.</p>
+ </li>
+
<li id="M202106190">
<!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -228,16 +252,6 @@
implemented in person's smartphone. Though merely asking for permission
would not necessarily legitimize this.</p>
</li>
-
- <li id="M201808131">
- <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data">Google
- will track people even if people turn off location history</a>, using
- Google Maps, weather updates, and browser searches. Google basically
- uses any app activity to track people.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -300,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 08:31:54 $
+$Date: 2021/07/06 09:33:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary/po/proprietary.zh-cn.po 6 Jul 2021 09:23:44 -0000 1.228
+++ proprietary/po/proprietary.zh-cn.po 6 Jul 2021 09:33:36 -0000 1.229
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-04 05:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary/po/zh-cn.po 4 Jul 2021 05:31:23 -0000 1.201
+++ proprietary/po/zh-cn.po 6 Jul 2021 09:33:36 -0000 1.202
@@ -420,6 +420,10 @@
"people's treadmills by a software update</a>. The company now asks people "
"for a membership/subscription for what people already paid for."
msgstr ""
+"Peloton å
¬å¸ç产çè·æ¥æºæè¿ <a
href=\"https://www.bleepingcomputer.com/news/"
+"technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-"
+"recall/\">éè¿è½¯ä»¶å级让人æ
æ³ä½¿ç¨è·æ¥æºçåºæ¬åè½</a>ã该å
¬å¸ç°å¨è®©äººä»¬ä¸ºå·²"
+"ç»ä»è´¹çåè½è¿è¡ä¼å注åæ订é
ã"
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -427,6 +431,8 @@
"doors to force software updates. It teaches the lesson that if a product "
"talks to external networks, you must expect it to take in new malware."
msgstr ""
+"该è·æ¥æºç软件æ¯ä¸æ软件ï¼å¾å¯è½å¸¦æ强å¶å级çåé¨ãè¿ä»¶äºæ
çæè®å°±æ¯å½ä¸ä¸ª"
+"产åæå¤é¨ç½ç»éä¿¡çåè½æ¶ï¼é£ä¹ä½ å¿
é¡»è¦æå®å¸¦ææ¶æ软件ã"
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -434,6 +440,7 @@
"reverse the changes so people will no longer need subscription to use the "
"locked feature."
msgstr ""
+"请注æï¼è¯¥å
¬å¸è¯´ä»ä»¬ä¼åé软件ï¼è¿æ
·äººä»¬å°±ä¸ç¨å注åæè½ä½¿ç¨è·æ¥æºçåè½ã"
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -442,6 +449,8 @@
"the proprietary software that is their entry path) to the point that even "
"the most powerful companies don't dare."
msgstr ""
+"æ¾ç¶ï¼å
¬ä¼çæ¤æ使该å
¬å¸ååºäºè®©æ¥ãå¦ææ们è¦ç¡®ä¿å®å
¨ï¼é£ä¹æ们è¿éè¦å¯¹æ¶æ"
+"åè½ï¼å
æ¬ä¸æ软件æ´ä½ï¼è¡¨ç¤ºæ¤æï¼è¿ç§æ¤æè¦ä½¿æææå¿çå
¬å¸ä¹å¿åçæ§ã"
#. type: Content of: <div><ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/surveillance-vs-democracy.zh-cn....,
GNUN <=