www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/surveillance-vs-democracy.zh-cn....


From: GNUN
Subject: www philosophy/surveillance-vs-democracy.zh-cn....
Date: Tue, 6 Jul 2021 05:33:37 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/06 05:33:36

Modified files:
        philosophy     : surveillance-vs-democracy.zh-cn.html 
        philosophy/po  : surveillance-vs-democracy.zh-cn-en.html 
                         surveillance-vs-democracy.zh-cn.po 
        proprietary    : proprietary.zh-cn.html 
        proprietary/po : proprietary.zh-cn-en.html proprietary.zh-cn.po 
                         zh-cn.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.zh-cn.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.zh-cn.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.201&r2=1.202

Patches:
Index: philosophy/surveillance-vs-democracy.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.zh-cn.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/surveillance-vs-democracy.zh-cn.html     18 Dec 2020 07:31:33 
-0000      1.24
+++ philosophy/surveillance-vs-democracy.zh-cn.html     6 Jul 2021 09:33:34 
-0000       1.25
@@ -1,7 +1,8 @@
 <!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.zh-cn.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>民主能够承受多少监控? - GNU工程 - 
自由软件基金会</title>
@@ -21,7 +22,7 @@
 <!--#include virtual="/server/banner.zh-cn.html" -->
 <h2 class="center">民主能够承受多少监控?</h2>
 
-<address class="byline center"><a href="http://www.stallman.org/";>Richard 
Stallman</a> 著</address>
+<address class="byline center"><a href="https://www.stallman.org/";>Richard 
Stallman</a> 著</address>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
@@ -56,11 +57,11 @@
 年起就开始提倡的那æ 
·</a>,是我们控制数字生活的第一步,其中就包
括防止监控。我们不能相信非自由软件;NSA<sup><a
 href="#TransNote1">1</a></sup><a
 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>利用</a>甚至<a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>制é€
 </a>非自由软件的安全弱点来å…
¥ä¾µæˆ‘们的电脑和路由器。自由软件让我们能够控制自己的电脑,但是<a
-href="http://www.wired.com/opinion/2013/10/149481/";>这并不能在我们上网时保护我们的隐私。</a>。</p>
+href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>制é€
 </a>非自由软件的安全弱点来å…
¥ä¾µæˆ‘们的电脑和路由器。自由软件让我们能够控制自己的电脑,但是<a
+href="https://www.wired.com/opinion/2013/10/149481/";>这并不能在我们上网时保护我们的隐私。</a>。</p>
 
 <p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>在美国,两å
…šç«‹æ³•æ¥&ldquo;限制国内
监控权力&rdquo;</a>正在计划中,但是它依赖于限制政府使用我们的虚拟档案<sup><a
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>在美国,两å
…šç«‹æ³•æ¥&ldquo;限制国内
监控权力&rdquo;</a>正在计划中,但是它依赖于限制政府使用我们的虚拟档案<sup><a
 href="#TransNote2">2</a></sup>。如果&ldquo;抓捕报警者
&rdquo;的前提是获取指认她/他的足够资料,那么这æ 
·çš„立法不足以保护报警者。我们需要更进一步。</p>
 </div>
 
@@ -70,14 +71,14 @@
 <p>如果报警者
不敢披露罪恶和谎言,我们就失去了对政府和制度的最后一丝控制。这就是为什么å
…è®¸æ”¿åºœå‘现谁是报告者的监控是过度的监控&mdash;是民主无
法承受的过度监控。</p>
 
 <p>在2011年,某美国政府官员幸灾乐祸地告诉记者<a
-href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>美国政府不会ä¼
 å”¤æŠ¥å‘Šè€…,因为&ldquo;我们知道你
和谁谈过。&rdquo;</a>有时,<a
-href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>è®°è€
…
的通话记录会被调取</a>以查明通话人,但是Snowden向我们展示了å
…¶å®žç¾Žå›½æ‰€æœ‰äººçš„通话记录都被调取,随时调取,<a
+href="https://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>美国政府不会ä¼
 å”¤æŠ¥å‘Šè€…,因为&ldquo;我们知道你
和谁谈过。&rdquo;</a>有时,<a
+href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>è®°è€
…
的通话记录会被调取</a>以查明通话人,但是Snowden向我们展示了å
…¶å®žç¾Žå›½æ‰€æœ‰äººçš„通话记录都被调取,随时调取,<a
 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>从Verizon</a>和<a
-href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>å
…¶ä»–公司</a>。</p>
+href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>å
…¶ä»–公司</a>。</p>
 
 <p>反对派和持不同证件者需要曝å…
‰å½“局的秘密,以防止政府利用秘密干坏事。ACLU<sup><a
 href="#TransNote3">3</a></sup>展示了美国政府<a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>系统性å…
¥ä¾µå’Œå¹³çš„持不同证件者组织的活动</a>,å…
¶å€Ÿå£å°±æ˜¯è¿™äº›ç»„织中可能有恐怖分子。监控过度的水平就是政府能够通过监控发现谁和记è€
…或持不同证件者谈过话的水平。</p>
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>系统性å…
¥ä¾µå’Œå¹³çš„持不同证件者组织的活动</a>,å…
¶å€Ÿå£å°±æ˜¯è¿™äº›ç»„织中可能有恐怖分子。监控过度的水平就是政府能够通过监控发现谁和记è€
…或持不同证件者谈过话的水平。</p>
 </div>
 
 <h3 class="subheader">信息,一旦被搜集,就会被滥用</h3>
@@ -85,16 +86,16 @@
 <div  class="columns">
 <p 
id="willbemisused">当人们认识到监控的水平过高时,他们的第一反应是提议限制获取数据。这听起来不错,但不解决问题,一点儿也不解决问题,即使假设政府会遵守这些条款也是一æ
 ·ã€‚(NSA误导了FISA<sup><a
 href="#TransNote4">4</a></sup>法庭,该法庭说它<a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>不能有效地让NSA负责</a>。)å›
 ä¸ºæ€€ç–‘有罪就能够成为获取数据的理由,所以一旦报警者
被指控&ldquo;从事谍报活动,&rdquo;那么搜索&ldquo;间谍&rdquo;就会成为获取数据的借口。</p>
+href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>不能有效地让NSA负责</a>。)å›
 ä¸ºæ€€ç–‘有罪就能够成为获取数据的理由,所以一旦报警者
被指控&ldquo;从事谍报活动,&rdquo;那么搜索&ldquo;间谍&rdquo;就会成为获取数据的借口。</p>
 
 <p>实际上,我们不能期望国家å…
¬åŠ¡äººå‘˜ä¼šéµå®ˆä½¿ç”¨ç›‘控数据的制度,即使编造
借口也不行&mdash;因为美国的公务员<a
 
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/";>已经在用谎言掩盖å
…
¶è¿ååˆ¶åº¦çš„行为</a>。这些制度本来就不是用来认真遵守的;相反,它们就是信不信由ä½
 çš„童话。</p>
 
 <p>另外,政府的监控人员还会因
私滥用这些数据。某些NSA人员<a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>使用政府的监控系统来追踪å
…¶æƒ…
人</a>&mdash;的过去、现在或计划&mdash;这在实践中称为&ldquo;LOVEINT。&rdquo;NSA声称它曾抓获和惩罚了å‡
 
起此类事件;我们并不知道还有多少起并未抓到。但这并不意外,å›
 ä¸ºä¸€ç›´ä»¥æ¥è­¦å¯Ÿå°±<a
+href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>使用政府的监控系统来追踪å
…¶æƒ…
人</a>&mdash;的过去、现在或计划&mdash;这在实践中称为&ldquo;LOVEINT。&rdquo;NSA声称它曾抓获和惩罚了å‡
 
起此类事件;我们并不知道还有多少起并未抓到。但这并不意外,å›
 ä¸ºä¸€ç›´ä»¥æ¥è­¦å¯Ÿå°±<a
 
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I";>使用访问驾ç
…
§è®°å½•çš„权力来追踪迷人的人</a>,这在实践中叫做&ldquo;查驾ç…
§çº¦ä¼šã€‚&rdquo;该行为还随着<a
 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>新的数字系统</a>扩å¼
 ã€‚在2016年,某公诉人被指控伪造法官签名以获准<a
-href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>搭线窃听一个å
…¶è¿·æ‹çš„对象</a>。AP<sup><a
+href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>搭线窃听一个å
…¶è¿·æ‹çš„对象</a>。AP<sup><a
 href="#TransNote5">5</a></sup>了解<a
 href="https://apnews.com/699236946e3140659fff8a2362e16f43";>更多美国的å…
¶ä»–案例</a>。
 </p>
@@ -102,14 +103,14 @@
 <p>即使禁止,监控数据总是会用于å…
¶ä»–目的。一旦数据已收集并且政府可以访问,那么政府有很多恶劣的方法使用该数据,比如<a
 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>欧洲</a>、<a
 
href="https://en.wikipedia.org/wiki/Japanese_American_internment";>美国</a>,以及最近<a
-href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>土耳å
…¶</a>的例子。(土耳其关于谁在真正使用Bylock程序的困扰仅
仅是恶化了对使用该程序的人的任意惩罚这种简单的故意不å…
¬æ­£ã€‚)
+href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>土耳å
…¶</a>的例子。(土耳其关于谁在真正使用Bylock程序的困扰仅
仅是恶化了对使用该程序的人的任意惩罚这种简单的故意不å…
¬æ­£ã€‚)
 </p>
 
 <p>由政府收集的个人数据也有可能被骇客通过入侵安å…
¨æœåŠ¡å™¨èŽ·å¾—,甚至被<a
 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml";>为敌对国家工作的骇客获得</a>。</p>
 
 <p>政府可以轻易使用其强大的监控能力<a
-href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>直接毁灭民主</a>。</p>
+href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>直接毁灭民主</a>。</p>
 
 <p>对监控的å…
¨é¢æŽŒæŽ§ä½¿å¾—政府可以对任何人开展大规模的钓鱼调查。要使言论和民主安å
…¨ï¼Œæˆ‘们必须限制政府对监控数据的访问。</p>
 </div>
@@ -121,7 +122,7 @@
 
href="https://necessaryandproportionate.org";>禁止大规模监控的滥用</a>。这些原则åŒ
…括,对报警者严æ 
¼ã€æ˜Žç¡®çš„法律保护;作为结果,这些原则足够来保护民主自由&mdash;&mdash;如果完å
…¨é‡‡çº³å¹¶æ°¸æ— ä¾‹å¤–地执行。</p>
 
 
<p>然而,这种法律保护是不确定的:正如当代历史展示的,法律会被废除(象FISA修正案)、终止或<a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>忽略</a>。</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>忽略</a>。</p>
 
 <p>同时,恶意政客会引用搜集证据的条款来作为å…
¨é¢ç›‘控的法律支持;恐怖袭击,即使只是杀死极少数人,也能作为他们发挥的理由。</p>
 
@@ -142,7 +143,7 @@
 
href="/philosophy/who-does-that-server-really-serve.html">用软件代替服务</a>;这也是把计算控制交给了别人,å›
 ä¸ºè¿™è¦æ±‚你把全部相关数据交给服务器。</p>
 
 <p>请你也保护朋友和熟人的隐私。<a
-href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>不要暴露他们的个人信息</a>除了如何联系他们,不要把邮件联系人和电话联系人交给任何网站。不要告诉诸如Facebook这æ
 ·çš„网站你朋友们不愿在报纸上公开的事。最好就是æ 
¹æœ¬ä¸è¦ä½¿ç”¨Facebook。请拒绝使用要求实名的系统,即使你高å…
´å®žåï¼Œä¹Ÿä¸è¦å› æ­¤è€Œç»™ä»–人的隐私带来压力。</p>
+href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>不要暴露他们的个人信息</a>除了如何联系他们,不要把邮件联系人和电话联系人交给任何网站。不要告诉诸如Facebook这æ
 ·çš„网站你朋友们不愿在报纸上公开的事。最好就是æ 
¹æœ¬ä¸è¦ä½¿ç”¨Facebook。请拒绝使用要求实名的系统,即使你高å…
´å®žåï¼Œä¹Ÿä¸è¦å› æ­¤è€Œç»™ä»–人的隐私带来压力。</p>
 
 <p>自我保护很重要,但是即使最严谨的自我保护也无
法在别人的设备上保护你的隐私。当我们和其他人交流或者
流连于城市之中时,我们的隐私依赖于社会的实践。我们可以避å
…ä¸€äº›ç›‘控我们交流和活动的系统,但是无法避å…
æ‰€æœ‰çš„监控系统。很明显,最好就是终止所有的监控,除了针对法律å
…è®¸çš„嫌疑犯。</p>
 </div>
@@ -179,7 +180,7 @@
 
 <p>NSA,通过PRISM<sup><a href="#TransNote7">7</a></sup>,可以<a
 href="https://www.commondreams.org/headline/2013/08/23-2";>进å…
¥è®¸å¤šå¤§åž‹ç½‘络集团的数据库</a>。AT&amp;T保存着自1987年以来的电话记录并<a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>让DEA<sup><a
+href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>让DEA<sup><a
 href="#TransNote8">8</a></sup>有权</a>按需查询。严æ 
¼æ¥è¯´ï¼Œç¾Žå›½æ”¿åºœä¸æ‹¥æœ‰è¿™äº›æ•°æ®ï¼Œä½†å®žé™…
上它就算拥有这些数据。某些公司由于<a
 
href="https://www.eff.org/who-has-your-back-government-data-requests-2015";>尽量阻挡政府调取数据的请求</a>而受到赞扬,但是这只能部分补偿å
…¶é¦–先收集数据带来的伤害。另外,很多此类å…
¬å¸è‡ªå·±ä¹Ÿç›´æŽ¥æ»¥ç”¨è¿™äº›æ•°æ®æˆ–者卖给数据掮客。</p>
 
@@ -188,12 +189,12 @@
 <p>网络监控到达目前水平的一个动机是很多网站æ 
¹æ®ç”¨æˆ·çš„活动和倾向做广告,并因
此获得经济回报。这使得原本只是令人讨厌的&mdash;可以忽略的广告&mdash;变成了æ—
 è®ºæˆ‘们是否知晓都会造
成伤害的监控系统。网络购买也会跟踪用户。我们都很清
楚&ldquo;隐私政策&rdquo;只是违反隐私的借口而非保护隐私的承诺。</p>
 
 
<p>我们可以采取匿名付款的系统同时改正以上两个问题&mdash;就是付款è€
…匿名。(我们并不想帮助收款人避税。)<a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>比特币并不匿名</a>,虽然有人开发了用比特币匿名付款的方法。然而,技术上,<a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>数字现金最早于1980年代首次被开发</a>;最早实现该功能的GNU软件叫做<a
-href="http://taler.net/";>GNU 
Taler</a>。现在我们只需要合适的商业规划,以及政府不要阻æŒ
 è¿™äº›è§„划。</p>
+href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>比特币并不匿名</a>,虽然有人开发了用比特币匿名付款的方法。然而,技术上,<a
+href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>数字现金最早于1980年代首次被开发</a>;最早实现该功能的GNU软件叫做<a
+href="https://taler.net/";>GNU 
Taler</a>。现在我们只需要合适的商业规划,以及政府不要阻æŒ
 è¿™äº›è§„划。</p>
 
 <p>另一个匿名付款的可能方法是使用<a
-href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>预付款电话卡</a>。它虽然不太方便,但是很容易实现。</p>
+href="/philosophy/phone-anonymous-payment.html">预付款电话卡</a>。它虽然不太方便,但是很容易实现。</p>
 
 <p>网站收集个人数据的另一个威胁是安全攻击者会侵å…
¥ï¼ŒèŽ·å–数据并滥用之。这包括客户信用卡的详情
。匿名付款系统会结束这个危险:网站的安å…
¨æ¼æ´žä¸ä¼šä¼¤å®³åˆ°ä½ ï¼Œå› ä¸ºç½‘站不知道你是谁。</p>
 </div>
@@ -221,14 +222,14 @@
 
 <div class="columns">
 <p>网络服务商和电话公司保留å…
¶ç”¨æˆ·çš„大量数据(浏览记录、通话记录等等)。对移动电话用户,他们还会<a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>记录用户的å
…·ä½“位置</a>。这些档案会保留很长时间:对AT&amp;T来说,超
过30年。在不久的将来他们甚至会<a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>记录用户的身体动作</a>。看起来<a
+href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>记录用户的å
…·ä½“位置</a>。这些档案会保留很长时间:对AT&amp;T来说,超
过30年。在不久的将来他们甚至会<a
+href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>记录用户的身体动作</a>。看起来<a
 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA也会大量收集移动电话的位置信息</a>。</p>
 
 <p>在制造
此类档案的系统中,通讯不被监控是不可能的。所以制造
和保留这些档案应该是非法的。必须禁止网络提供商和电话å…
¬å¸é•¿æ—¶é—´ä¿ç•™è¿™äº›ä¿¡æ¯ï¼Œé™¤éžé’ˆå¯¹æŸäº›æœ‰æ³•åº­å‘½ä»¤çš„对象。</p>
 
 <p>该解决方案不完全令人满意,因为它无法实际
阻止政府在数据产生之后立即获得&mdash;这正是<a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>美国政府对某些或å
…¨éƒ¨ç”µè¯å…
¬å¸çš„所作所为</a>。我们还是不得不依赖法律来禁止这种行为。但是,这总好过目前的æƒ
…况,相关法律(PAT
+href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>美国政府对某些或å
…¨éƒ¨ç”µè¯å…
¬å¸çš„所作所为</a>。我们还是不得不依赖法律来禁止这种行为。但是,这总好过目前的æƒ
…况,相关法律(PAT
 RIOT 
Act)并不明确地禁止这种行为。另外,如果政府要恢复监控,它也æ—
 æ³•èŽ·å¾—在恢复之前的通话记录。</p>
 
 <p>为了保护你
电子邮件通讯的隐私,一个简单的局部解决办法是你
和通讯者
使用不会和当地政府合作的邮件服务商,并互相使用加
密通讯。但是,Ladar
@@ -245,12 +246,12 @@
 <a
 
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/";>摄影è€
…</a>
 时。)加州的一个城市要求警察全程穿戴录像机,结果是 <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>警察使用武力的现象减少60%</a>。ACLU(美国å
…¬æ°‘自由联盟)很支持这个做法。</p>
+href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>警察使用武力的现象减少60%</a>。ACLU(美国å
…¬æ°‘自由联盟)很支持这个做法。</p>
 
 <p><a
 
href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266";>企业不是人,它们没有人权</a>。要求商业å
…¬å¸å…¬å¼€å…¶å¯èƒ½å¯¹ç¤¾ä¼šå¯¼è‡´åŒ–学、生物、æ 
¸ã€é‡‘融、计算(比如
 <a
-href="http://DefectiveByDesign.org";>DRM</a>)或政治(比如游说)等风险的活动的细节是合法的,如果这些风险对大众利益的影响达到了一定的水平。这些活动的危险(想想
+href="https://DefectiveByDesign.org";>DRM</a>)或政治(比如游说)等风险的活动的细节是合法的,如果这些风险对大众利益的影响达到了一定的水平。这些活动的危险(想想
 BP 原油泄漏、福岛核电站反应堆核心熔毁和 2008 
金融危机)超过了恐怖袭击。</p>
 
 <p>但是,言论自由必
须不受监控,即使它是以商业的形式呈现的。</p>
@@ -299,7 +300,7 @@
 
 <!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.zh-cn.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>请将有å…
³è‡ªç”±è½¯ä»¶åŸºé‡‘会(FSF)&amp;GNU的一般性问题发送到<a
@@ -318,12 +319,13 @@
 
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
-若您想翻译本文,请参看<a
-href="/server/standards/README.translations.html">翻译须知</a>获取有å…
³åè°ƒå’Œæäº¤ç¿»è¯‘的相关事项。</p>
+我们尽最大努力来提供精准和高质量的翻译,但难å…
ä¼šå­˜åœ¨é”™è¯¯å’Œä¸è¶³ã€‚如果您在这方面有评论或一般性的建议,请发送至
 <a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>。</p><p>å
…³äºŽè¿›è¡Œåè°ƒä¸Žæäº¤ç¿»è¯‘的更多信息参见
+<a href="/server/standards/README.translations.html">《译者
指南》</a>。</p>
 </div>
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
@@ -342,7 +344,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard 
Stallman</p>
 
 <p>本页面使用<a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
@@ -353,12 +355,12 @@
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
 <b>翻译团队</b>:<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017-2020。</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017-2021。</div>
 
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2020/12/18 07:31:33 $
+$Date: 2021/07/06 09:33:34 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/surveillance-vs-democracy.zh-cn-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/po/surveillance-vs-democracy.zh-cn-en.html       18 Dec 2020 
07:31:33 -0000      1.24
+++ philosophy/po/surveillance-vs-democracy.zh-cn-en.html       6 Jul 2021 
09:33:35 -0000       1.25
@@ -1,5 +1,6 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
@@ -17,7 +18,7 @@
 <h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
 <address class="byline center">by
-<a href="http://www.stallman.org/";>Richard Stallman</a></address>
+<a href="https://www.stallman.org/";>Richard Stallman</a></address>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
@@ -70,14 +71,14 @@
 can't trust nonfree software; the NSA
 <a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
 and
-even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
+even <a 
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/";>that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/";>that won't
 protect our privacy once we set foot on the Internet</a>.</p>
 
 <p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;</a> in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -97,22 +98,22 @@
 
 <p>An unnamed U.S. government official ominously told journalists in
 2011 that
-the <a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>U.S.
 would
+the <a 
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/";>U.S.
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;</a>
-Sometimes <a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
+Sometimes <a 
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
 phone call records are subpoenaed</a> to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, <a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>from
 Verizon</a>
-and <a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
+and <a 
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
 other companies too</a>.</p>
 
 <p>Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
 practice of infiltrating peaceful dissident groups</a> on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
@@ -128,7 +129,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
+was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
 to effectively hold the NSA accountable</a>.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -144,7 +145,7 @@
 
 <p>In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents <a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
+agents <a 
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
 U.S. surveillance systems to track their lovers</a>&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -157,7 +158,7 @@
 with <a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>new
 digital systems</a>.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to <a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
+to <a 
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
 wiretap someone who was the object of a romantic obsession</a>. The AP
 knows
 of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43";>many
@@ -171,7 +172,7 @@
 from <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Europe</a>,
 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>the
 US</a>, and most
-recently <a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
+recently <a 
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
@@ -183,7 +184,7 @@
 working for hostile states</a>.</p>
 
 <p>Governments can easily use massive surveillance capability
-to <a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
+to <a 
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
 democracy directly</a>.</p>
 
 <p>Total surveillance accessible to the state enables the state to
@@ -207,7 +208,7 @@
 <p>However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
 
 <p>Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -250,7 +251,7 @@
 pertinent data to the company's server.</p>
 
 <p>Protect your friends' and acquaintances' privacy,
-too.  <a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
+too.  <a 
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
 give out their personal information</a> except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -343,10 +344,10 @@
 systematically available to the state.</p>
 
 <p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2";>gotten
+has <a 
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies";>gotten
 into the databases of many large Internet corporations</a>.  AT&amp;T
 has saved all its phone call records since 1987
-and <a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
+and <a 
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
 them available to the DEA</a> to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -376,17 +377,17 @@
 <p>We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  <a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+taxes.)  <a 
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
 is not anonymous</a>, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
+for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
 cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/";>GNU Taler</a>.  Now we need
+this is called <a href="https://taler.net/";>GNU Taler</a>.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.</p>
 
 <p>Another possible method for anonymous payments would
-use <a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
 phone cards</a>.  It is less convenient, but very easy to
 implement.</p>
 
@@ -463,10 +464,10 @@
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also <a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
+also <a 
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
 the user's physical location</a>.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even <a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
+even <a 
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
 the user's body activities</a>.  It appears that
 the <a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA
 collects cell phone location data</a> in bulk.</p>
@@ -479,7 +480,7 @@
 <p>This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the <a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
+the <a 
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
 with some or all phone companies</a>.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -520,7 +521,7 @@
 photographers</a>.)
 One city in California that required police to wear video cameras all
 the time
-found <a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
+found <a 
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
 use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
 
 <p><a
@@ -528,7 +529,7 @@
 are not people, and not entitled to human rights</a>.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org";>DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org";>DRM</a>) or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -573,7 +574,7 @@
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>Please send general FSF &amp; GNU inquiries to
@@ -591,13 +592,13 @@
         to <a href="mailto:web-translators@gnu.org";>
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
 Please see the <a
 href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
 of this article.</p>
 </div>
 
@@ -618,7 +619,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard 
Stallman</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -628,7 +629,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/12/18 07:31:33 $
+$Date: 2021/07/06 09:33:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/surveillance-vs-democracy.zh-cn.po    6 Jul 2021 09:14:14 
-0000       1.63
+++ philosophy/po/surveillance-vs-democracy.zh-cn.po    6 Jul 2021 09:33:35 
-0000       1.64
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-03 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""

Index: proprietary/proprietary.zh-cn.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.zh-cn.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/proprietary.zh-cn.html  28 Jun 2021 08:31:54 -0000      1.56
+++ proprietary/proprietary.zh-cn.html  6 Jul 2021 09:33:35 -0000       1.57
@@ -169,6 +169,22 @@
 <h3 id="latest">最新添加</h3>
 
 <ul class="blurbs">
+  <li id="M202106220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Peloton 公司生产的跑步机最近 <a
+href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/";>通过软件升级让人æ—
 æ³•ä½¿ç”¨è·‘步机的基本功能</a>。该å…
¬å¸çŽ°åœ¨è®©äººä»¬ä¸ºå·²ç»ä»˜è´¹çš„功能进行会员注册或订阅。</p>
+
+    
<p>该跑步机的软件是专有软件,很可能带有强制升级的后门。这件事æƒ
…的教训就是当一个产品有外部网络通信的功能时,那么你必
须警惕它带有恶意软件。</p>
+
+    <p>请注意,该公司说他们会回退软件,这æ 
·äººä»¬å°±ä¸ç”¨å†æ³¨å†Œæ‰èƒ½ä½¿ç”¨è·‘步机的功能。</p>
+
+    <p>显然,公众的愤怒使该å…
¬å¸åšå‡ºäº†è®©æ­¥ã€‚如果我们要确保安å…
¨ï¼Œé‚£ä¹ˆæˆ‘们还需要对恶意功能(包
括专有软件整体)表示愤怒,这种愤怒要使最有权势的å…
¬å¸ä¹Ÿå¿ƒå­˜ç•æƒ§ã€‚</p>
+  </li>
+
   <li id="M202106190">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -212,17 +228,6 @@
 
href="https://www.lifewire.com/wifi-positioning-system-1683343";>收集人们的网络访问地点和
 GPS 坐标(可用于确定人们的精确位置),即使人们关闭 GPS 
服务也是一样</a>。然而仅仅
是征得人们的许可并不能使这种行为合法。</p>
   </li>
-
-  <li id="M201808131">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2018-08</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>即使人们å
…³é—­ä½ç½®æœåŠ¡ï¼Œä¹Ÿä¼šè¢«è°·æ­Œè¿½è¸ª</a>,谷歌使用
-Google 
Maps、天气更新和浏览器搜索等方式。谷歌基本上是用一切应用的使用来追踪人们。</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">更多内容&hellip;</a></p>
@@ -298,7 +303,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2021/06/28 08:31:54 $
+$Date: 2021/07/06 09:33:35 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary.zh-cn-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary.zh-cn-en.html    28 Jun 2021 08:31:54 -0000      
1.57
+++ proprietary/po/proprietary.zh-cn-en.html    6 Jul 2021 09:33:36 -0000       
1.58
@@ -186,6 +186,30 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202106220">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Peloton company which produces treadmills recently <a
+    
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/";>locked
+    people out of basic features of people's treadmills by a software
+    update</a>. The company now asks people for a membership/subscription
+    for what people already paid for.</p>
+
+    <p>The software used in the treadmill is proprietary and probably
+    includes back doors to force software updates. It teaches the lesson
+    that if a product talks to external networks, you must expect it to
+    take in new malware.</p>
+
+    <p>Please note that the company behind this product said they
+    are working to reverse the changes so people will no longer need
+    subscription to use the locked feature.</p>
+
+    <p>Apparently public anger made the company back down. If we want that
+    to be our safety, we need to build up the anger against malicious
+    features (and the proprietary software that is their entry path)
+    to the point that even the most powerful companies don't dare.</p>
+  </li>
+
   <li id="M202106190">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -228,16 +252,6 @@
     implemented in person's smartphone. Though merely asking for permission
     would not necessarily legitimize this.</p>
   </li>
-
-  <li id="M201808131">
-    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>Google
-    will track people even if people turn off location history</a>, using
-    Google Maps, weather updates, and browser searches. Google basically
-    uses any app activity to track people.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -300,7 +314,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/28 08:31:54 $
+$Date: 2021/07/06 09:33:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary/po/proprietary.zh-cn.po 6 Jul 2021 09:23:44 -0000       1.228
+++ proprietary/po/proprietary.zh-cn.po 6 Jul 2021 09:33:36 -0000       1.229
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-07-04 05:25+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary/po/zh-cn.po     4 Jul 2021 05:31:23 -0000       1.201
+++ proprietary/po/zh-cn.po     6 Jul 2021 09:33:36 -0000       1.202
@@ -420,6 +420,10 @@
 "people's treadmills by a software update</a>. The company now asks people "
 "for a membership/subscription for what people already paid for."
 msgstr ""
+"Peloton 公司生产的跑步机最近 <a 
href=\"https://www.bleepingcomputer.com/news/";
+"technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-"
+"recall/\">通过软件升级让人无
法使用跑步机的基本功能</a>。该公司现在让人们为已"
+"经付费的功能进行会员注册或订阅。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -427,6 +431,8 @@
 "doors to force software updates. It teaches the lesson that if a product "
 "talks to external networks, you must expect it to take in new malware."
 msgstr ""
+"该跑步机的软件是专有软件,很可能带有强制升级的后门。这件事æƒ
…的教训就是当一个"
+"产品有外部网络通信的功能时,那么你必
须警惕它带有恶意软件。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -434,6 +440,7 @@
 "reverse the changes so people will no longer need subscription to use the "
 "locked feature."
 msgstr ""
+"请注意,该公司说他们会回退软件,这æ 
·äººä»¬å°±ä¸ç”¨å†æ³¨å†Œæ‰èƒ½ä½¿ç”¨è·‘步机的功能。"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -442,6 +449,8 @@
 "the proprietary software that is their entry path)  to the point that even "
 "the most powerful companies don't dare."
 msgstr ""
+"显然,公众的愤怒使该å…
¬å¸åšå‡ºäº†è®©æ­¥ã€‚如果我们要确保安å…
¨ï¼Œé‚£ä¹ˆæˆ‘们还需要对恶意"
+"功能(包
括专有软件整体)表示愤怒,这种愤怒要使最有权势的å…
¬å¸ä¹Ÿå¿ƒå­˜ç•æƒ§ã€‚"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]