[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po all.fr.po all.pot all.pt-br....
From: |
GNUN |
Subject: |
www/proprietary/po all.fr.po all.pot all.pt-br.... |
Date: |
Thu, 15 Jul 2021 02:32:51 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/15 02:32:50
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po
es.po fr.po it.po ja.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.pt-br.po
malware-microsoft.ru.po nl.po pl.po pot
potential-malware.de-diff.html
potential-malware.de.po potential-malware.es.po
potential-malware.fr.po potential-malware.pot
potential-malware.pt-br.po
potential-malware.ru.po
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary-manipulation.es.po
proprietary-manipulation.fr.po
proprietary-manipulation.pot
proprietary-manipulation.pt-br.po
proprietary-manipulation.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.468&r2=1.469
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.577&r2=1.578
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pt-br.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.es.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pt-br.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.486&r2=1.487
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.513&r2=1.514
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.436&r2=1.437
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.532&r2=1.533
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.684&r2=1.685
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.326&r2=1.327
Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- all.fr.po 4 Jul 2021 19:00:28 -0000 1.34
+++ all.fr.po 15 Jul 2021 06:32:47 -0000 1.35
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-04 20:56+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -79,6 +80,39 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -449,14 +483,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- all.pot 4 Jul 2021 05:31:21 -0000 1.17
+++ all.pot 15 Jul 2021 06:32:47 -0000 1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,38 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can
"
+"allow crackers to remotely gain access to the operating system</a> and "
+"install programs, view and delete data, or even create new user accounts "
+"with full user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\">Advertising
"
+"companies are experimenting to manipulate people's minds</a> and impose a "
+"new way of advertising by altering their dreams. This “targeted dream "
+"incubation” would trigger “refreshing dreams” of the "
+"product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a "
"href=\"https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/\">locked
"
"people out of basic features of people's treadmills by a software "
@@ -313,12 +345,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a "
"href=\"https://frame.work/blog/in-defense-of-dumb-tvs\">it's now very hard "
Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- all.pt-br.po 11 Jul 2021 23:33:27 -0000 1.10
+++ all.pt-br.po 15 Jul 2021 06:32:47 -0000 1.11
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -80,6 +81,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -445,15 +480,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- all.ru.po 5 Jul 2021 10:00:43 -0000 1.33
+++ all.ru.po 15 Jul 2021 06:32:47 -0000 1.34
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -85,6 +86,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -451,15 +486,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- de.po 4 Jul 2021 05:31:21 -0000 1.326
+++ de.po 15 Jul 2021 06:32:47 -0000 1.327
@@ -662,6 +662,49 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
+# | term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+wrongly refers to crackers as “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -895,24 +938,6 @@
msgstr ""
#. type: Content of: <div><ul><li><p>
-# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
-# | term <a
-# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
-# | {+wrongly refers to crackers as “<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\">“monetize”</a>."
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
-"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
-#. type: Content of: <div><ul><li><p>
msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
@@ -13023,9 +13048,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -13033,8 +13058,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -15051,6 +15076,20 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
#~ msgid ""
#~ "Google Chrome includes a module that <a href=\"https://www."
#~ "privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.468
retrieving revision 1.469
diff -u -b -r1.468 -r1.469
--- es.po 8 Jul 2021 09:33:22 -0000 1.468
+++ es.po 15 Jul 2021 06:32:47 -0000 1.469
@@ -602,6 +602,50 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -1081,25 +1125,6 @@
"decÃrselo."
#. type: Content of: <div><ul><li><p>
-# | <small>[-(-]Please note that the article wrongly refers to crackers as
-# | [-\"<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
-# | {+“<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
-
-#. type: Content of: <div><ul><li><p>
msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
@@ -14289,22 +14314,22 @@
"de ser engañado."
#. type: Content of: <div><p>
-# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
-# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
# | references to back them up), but there are surely thousands more we don't
# | know about.
#, fuzzy
#| msgid ""
-#| "As of March, 2021, the pages in this directory list around 500 instances "
-#| "of malicious functionalities (with more than 590 references to back them "
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Hasta marzo de 2021, las páginas de este directorio ofrecen una lista de "
-"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 590 "
+"Hasta junio de 2021, las páginas de este directorio ofrecen una lista de "
+"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 600 "
"referencias de apoyo), pero seguramente hay miles más que desconocemos."
#. type: Content of: <div><p>
@@ -15888,6 +15913,20 @@
#, fuzzy
#~| msgid ""
+#~| "As of March, 2021, the pages in this directory list around 500 instances "
+#~| "of malicious functionalities (with more than 590 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta marzo de 2021, las páginas de este directorio ofrecen una lista de "
+#~ "alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 590 "
+#~ "referencias de apoyo), pero seguramente hay miles más que desconocemos."
+
+#, fuzzy
+#~| msgid ""
#~| "Google Chrome, running on Windows, <a href=\"https://www."
#~| "privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-"
#~| "your-room-shows-the-importance-of-privacy-defense-in-depth/\">is a jail</"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.577
retrieving revision 1.578
diff -u -b -r1.577 -r1.578
--- fr.po 4 Jul 2021 18:59:22 -0000 1.577
+++ fr.po 15 Jul 2021 06:32:48 -0000 1.578
@@ -502,6 +502,39 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -872,14 +905,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -12055,9 +12080,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"En juin 2021, les pages de ce répertoire dénombraient à peu près 500 cas
de "
@@ -13459,3 +13493,12 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En juin 2021, les pages de ce répertoire dénombraient à peu près 500
cas "
+#~ "de fonctionnalités malveillante (appuyés par plus de 600 références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- it.po 4 Jul 2021 05:31:21 -0000 1.326
+++ it.po 15 Jul 2021 06:32:48 -0000 1.327
@@ -628,6 +628,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -862,12 +893,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -12133,9 +12158,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -12143,8 +12168,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -14124,6 +14149,20 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
#~ msgid ""
#~ "Google Chrome includes a module that <a href=\"https://www."
#~ "privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-"
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- ja.po 4 Jul 2021 05:31:21 -0000 1.334
+++ ja.po 15 Jul 2021 06:32:48 -0000 1.335
@@ -471,6 +471,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -705,12 +736,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -9930,8 +9955,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -11297,6 +11322,19 @@
#~| "instances of malicious functionalities, but there are surely thousands "
#~| "more we don't know about."
#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ã"
+#~
"ã¾ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
#~ "As of March, 2021, the pages in this directory list around 500 instances "
#~ "of malicious functionalities (with more than 590 references to back them "
#~ "up), but there are surely thousands more we don't know about."
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-microsoft.de-diff.html 13 Jun 2021 08:31:01 -0000 1.82
+++ malware-microsoft.de-diff.html 15 Jul 2021 06:32:48 -0000 1.83
@@ -268,6 +268,20 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -655,7 +669,7 @@
<h3 <span class="removed"><del><strong>id="interference">Microsoft
Interference</h3>
-<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>id="subscriptions">Subscriptions</h3>
<ul class="blurbs">
<li id="M201507150">
@@ -663,7 +677,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe to Office 365 to be able to create/edit
documents</a>.</p>
+ subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+interference.</p>
+
+<ul>
+ <li><p>Microsoft is planning</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>make Windows</strong></del></span> <span
class="inserted"><ins><em>be able to create/edit documents</a>.</p>
</li>
</ul>
@@ -674,10 +693,13 @@
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers <a
-
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After
- a public outburst, Microsoft stated that <a
+ <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
+ impose use of its browser, Edge, in certain
circumstances</a>.</p>
+ <p>The reason Microsoft can force things</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ snoop</em></ins></span> on <span class="removed"><del><strong>users
is</strong></del></span> <span class="inserted"><ins><em>each
employee</a>. After
+ a public outburst, Microsoft stated</em></ins></span> that <span
class="removed"><del><strong>Windows</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope so.</p>
</li>
@@ -685,107 +707,107 @@
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is imposing its
- surveillance on</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like sabotage, but they
are not grave enough</strong></del></span> <span class="inserted"><ins><em>game
of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player</em></ins></span> to <span
class="removed"><del><strong>qualify
-for</strong></del></span> <span class="inserted"><ins><em>open an account on
Microsoft's network</a>. Microsoft
- has bought</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>game</em></ins></span> and <span
class="removed"><del><strong>wrong. This section describes
examples</strong></del></span> <span class="inserted"><ins><em>will merge all
accounts into its network,
+ <p>Microsoft</em></ins></span> is
+ <span class="removed"><del><strong>nonfree.</p></li>
+
+ <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>imposing its
+ surveillance on the game of Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's
network</a>.</em></ins></span> Microsoft <span
class="removed"><del><strong>products</strong></del></span>
+ <span class="inserted"><ins><em>has bought the game</em></ins></span> and
<span class="inserted"><ins><em>will merge all accounts into</em></ins></span>
its
+ <span class="removed"><del><strong>partners'
products</a>.</p>
+ <p>The article's author starts from the
premise</strong></del></span> <span class="inserted"><ins><em>network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
-interference.</p>
-
-<ul>
- <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>Minetest</em></ins></span> is <span
class="removed"><del><strong>planning to make Windows <a
-
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use</strong></del></span> <span class="inserted"><ins><em>that it
is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>Microsoft
+ has</strong></del></span> <span class="inserted"><ins><em>it is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a <span class="removed"><del><strong>right to control what
Windows does to users, as long as</strong></del></span> <span
class="inserted"><ins><em>bonus,</em></ins></span>
+ it
+ <span class="removed"><del><strong>doesn't go “too far”. We
disagree.</p></li>
+
+ <li><p>Microsoft inserts <a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside</strong></del></span> <span
class="inserted"><ins><em>offers more options.</p>
</li>
<li id="M202010210">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As</em></ins></span> of <span class="removed"><del><strong>its
browser, Edge,</strong></del></span> <span class="inserted"><ins><em>2019-2020,
Minecraft players are <a
+ <p>As</em></ins></span> of <span class="removed"><del><strong>the
File Explorer</a></strong></del></span> <span
class="inserted"><ins><em>2019-2020, Minecraft players are <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
- forced to move to Microsoft servers</a>, which
results</em></ins></span> in <span class="removed"><del><strong>certain
circumstances</a>.</p>
- <p>The reason</strong></del></span>
- <span class="inserted"><ins><em>privacy violation.</em></ins></span>
Microsoft <span class="removed"><del><strong>can force things
on</strong></del></span> <span class="inserted"><ins><em>publishes a program
so</em></ins></span> users <span class="inserted"><ins><em>can run
- their own server, but the program</em></ins></span> is <span
class="removed"><del><strong>that Windows is
- nonfree.</p></li>
-
- <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>proprietary and it's another</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads for Microsoft products</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">injustice
- to users</a>.</p>
+ forced</em></ins></span> to <span
class="removed"><del><strong>nag</strong></del></span> <span
class="inserted"><ins><em>move to Microsoft servers</a>, which results in
+ privacy violation. Microsoft publishes a program so</em></ins></span>
users <span class="inserted"><ins><em>can run
+ their own server, but the program is proprietary and it's another <a
+
href="/philosophy/free-software-even-more-important.html">injustice</em></ins></span>
+ to <span class="removed"><del><strong>buy subscriptions
for</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
<p>People can play <a
href="https://directory.fsf.org/wiki/Minetest">Minetest</a>
- instead. Minetest is free software</em></ins></span> and <span
class="removed"><del><strong>its
- partners' products</a>.</p>
- <p>The article's author starts from</strong></del></span> <span
class="inserted"><ins><em>respects</em></ins></span> the <span
class="removed"><del><strong>premise that</strong></del></span> <span
class="inserted"><ins><em>user's computer
+ instead. Minetest is free software and respects</em></ins></span> the
<span class="removed"><del><strong>OneDrive service.</p></li>
+
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>user's computer
freedom.</p>
</li>
<li id="M202004301">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Proprietary programs Google Meet,</em></ins></span> Microsoft
- <span class="removed"><del><strong>has</strong></del></span> <span
class="inserted"><ins><em>Teams, and WebEx <a
+ <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
- collecting user's personal and identifiable data</a> including how
long</em></ins></span>
- a <span class="removed"><del><strong>right to control what Windows
does</strong></del></span> <span class="inserted"><ins><em>call lasts, who's
participating in the call, and the IP addresses
+ collecting user's personal and identifiable data</a> including how
long
+ a call lasts, who's participating in the call, and the IP addresses
of everyone taking part. From experience, this can even harm users
- physically if those companies hand over data</em></ins></span> to <span
class="removed"><del><strong>users, as long as it
- doesn't go “too far”. We disagree.</p></li>
-
- <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>governments.</p>
+ physically if those companies hand over data</em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install
base,</strong></del></span> <span
class="inserted"><ins><em>governments.</p>
</li>
<li id="M202004131">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other
companies)</em></ins></span>
+ <p>Google, Apple, and</em></ins></span> Microsoft <span
class="inserted"><ins><em>(and probably some other companies)</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside of</strong></del></span> <span
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice</strong></del></span> <span
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343">are
+ collecting people's access points</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>GPS coordinates (which can
identify people's precise location) even if their GPS is turned
- off</a>, without</em></ins></span> the <span
class="removed"><del><strong>File Explorer</a> to
nag</strong></del></span> <span class="inserted"><ins><em>person's consent,
using proprietary software
+ off</a>, without the person's consent, using proprietary software
implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
+ would not necessarily legitimize this.</p></em></ins></span>
</li>
- <li id="M201912160">
+<span class="removed"><del><strong><li><p>Microsoft has
+started</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912160">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
- users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
+ <p>Microsoft is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
+ users <span class="removed"><del><strong>obnoxiously and
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an
account on their network</a> to be able</em></ins></span> to install
+ <span class="inserted"><ins><em>and use the</em></ins></span> Windows
<span class="removed"><del><strong>10</a>.</p></li>
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span>
- and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>use the Windows operating system, which is malware.
The account can
+ <li><p>Microsoft
+ <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ tricking
+ users</a></strong></del></span> <span
class="inserted"><ins><em>operating system, which is malware. The account can
be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p></em></ins></span>
+ such as turning their purchased software to a subscription
product.</p>
</li>
-<span class="removed"><del><strong><li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908210">
+ <li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>of Xboxes</em></ins></span> and <span
class="removed"><del><strong>repeatedly</strong></del></span> <span
class="inserted"><ins><em>had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>install Windows 10</a>.</p></li>
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
- <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>the recordings</a>.</p>
+ <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the
+<span class="removed"><del><strong>company's
+sysadmins</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
@@ -794,9 +816,8 @@
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
- tricking
- users</a></strong></del></span>
+ <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -806,16 +827,9 @@
<li id="M201905281">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-into replacing Windows 7 with Windows 10</a>.</p></li>
-
- <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to be able to create
an account on</em></ins></span>
- the company's
-<span class="removed"><del><strong>sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue</strong></del></span>
<span class="inserted"><ins><em>network. On top of mistreating
their</em></ins></span> users <span class="removed"><del><strong>to complain
to</strong></del></span> <span class="inserted"><ins><em>by providing
- nonfree software, Microsoft is tracking their lives
outside</em></ins></span> the <span class="removed"><del><strong>sysadmins
about not “upgrading” to Windows
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="removed"><del><strong>the sysadmins
about not “upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
10</a>.</p></li>
</ul>
@@ -823,7 +837,9 @@
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>computer and
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>create an account on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is tracking their lives outside the computer
and
violates their privacy.</p>
</li>
@@ -1220,7 +1236,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/13 08:31:01 $
+$Date: 2021/07/15 06:32:48 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- malware-microsoft.de.po 13 Jun 2021 08:31:01 -0000 1.172
+++ malware-microsoft.de.po 15 Jul 2021 06:32:48 -0000 1.173
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -467,6 +467,40 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
+# | term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+wrongly refers to crackers as “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- malware-microsoft.es.po 13 Jun 2021 10:29:29 -0000 1.230
+++ malware-microsoft.es.po 15 Jul 2021 06:32:48 -0000 1.231
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -339,6 +340,41 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- malware-microsoft.fr.po 13 Jun 2021 11:37:07 -0000 1.234
+++ malware-microsoft.fr.po 15 Jul 2021 06:32:48 -0000 1.235
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-13 13:33+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -335,6 +336,30 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-microsoft.it-diff.html 13 Jun 2021 08:31:01 -0000 1.79
+++ malware-microsoft.it-diff.html 15 Jul 2021 06:32:48 -0000 1.80
@@ -102,10 +102,10 @@
<li><a href="#surveillance">Surveillance</a></li>
<li><a <span class="removed"><del><strong>href="#drm">Digital
restrictions
management</a> or “DRM” means functionalities designed
- to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>—systems
- that impose censorship on application
programs.</li></strong></del></span> <span
class="inserted"><ins><em>href="#tethers">Tethers</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#tyrants">Tyrants</a>—systems
+ to restrict what users can do with the data in their
computers.</li></strong></del></span> <span
class="inserted"><ins><em>href="#tethers">Tethers</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li></strong></del></span> <span
class="inserted"><ins><em>href="#tyrants">Tyrants</a></li></em></ins></span>
</ul>
@@ -269,6 +269,20 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -719,55 +733,54 @@
--><!--#echo encoding="none" var="DATE" -->
<p>As</em></ins></span> of <span class="removed"><del><strong>the
File Explorer</a></strong></del></span> <span
class="inserted"><ins><em>2019-2020, Minecraft players are <a
href="https://www.minecraft.net/en-us/article/java-edition-moving-house">being
- forced</em></ins></span> to <span class="removed"><del><strong>nag
- users</strong></del></span> <span
class="inserted"><ins><em>move</em></ins></span> to <span
class="removed"><del><strong>buy subscriptions for</strong></del></span> <span
class="inserted"><ins><em>Microsoft servers</a>, which results in
- privacy violation. Microsoft publishes a program so users can run
- their own server, but</em></ins></span> the <span
class="removed"><del><strong>OneDrive service.</p></li>
-
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>program is proprietary and it's another <a
+ forced</em></ins></span> to <span
class="removed"><del><strong>nag</strong></del></span> <span
class="inserted"><ins><em>move to Microsoft servers</a>, which results in
+ privacy violation. Microsoft publishes a program so</em></ins></span>
users <span class="inserted"><ins><em>can run
+ their own server, but the program is proprietary and it's another <a
href="/philosophy/free-software-even-more-important.html">injustice</em></ins></span>
- to <span class="removed"><del><strong>increase Windows 10's install base,
Microsoft</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
+ to <span class="removed"><del><strong>buy subscriptions
for</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
- <p>People can play</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">Minetest</a>
- instead. Minetest is free software</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>respects the user's computer
- freedom.</p></em></ins></span>
- </li>
+ <p>People can play <a
+ href="https://directory.fsf.org/wiki/Minetest">Minetest</a>
+ instead. Minetest is free software and respects</em></ins></span> the
<span class="removed"><del><strong>OneDrive service.</p></li>
-<span class="removed"><del><strong><li><p>Microsoft has
-started</strong></del></span>
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>user's computer
+ freedom.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202004301">
+ <li id="M202004301">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Proprietary programs Google Meet, Microsoft Teams, and
WebEx</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+ <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
collecting user's personal and identifiable data</a> including how
long
a call lasts, who's participating in the call, and the IP addresses
- of everyone taking part. From experience, this can even
harm</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span>
- <span class="inserted"><ins><em>physically if those companies hand over
data to governments.</p>
+ of everyone taking part. From experience, this can even harm users
+ physically if those companies hand over data</em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install
base,</strong></del></span> <span
class="inserted"><ins><em>governments.</p>
</li>
<li id="M202004131">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple,</em></ins></span> and <span
class="removed"><del><strong>repeatedly</strong></del></span> <span
class="inserted"><ins><em>Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
+ <p>Google, Apple, and</em></ins></span> Microsoft <span
class="inserted"><ins><em>(and probably some other companies)</em></ins></span>
+ <a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice</strong></del></span> <span
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343">are
+ collecting people's access points</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>GPS coordinates (which can
identify people's precise location) even if their GPS is turned
off</a>, without the person's consent, using proprietary software
implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
+ would not necessarily legitimize this.</p></em></ins></span>
</li>
- <li id="M201912160">
+<span class="removed"><del><strong><li><p>Microsoft has
+started</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912160">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be
able</em></ins></span> to install
+ <p>Microsoft is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
+ users <span class="removed"><del><strong>obnoxiously and
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an
account on their network</a> to be able</em></ins></span> to install
<span class="inserted"><ins><em>and use the</em></ins></span> Windows
<span class="removed"><del><strong>10</a>.</p></li>
<li><p>Microsoft
@@ -1212,7 +1225,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/13 08:31:01 $
+$Date: 2021/07/15 06:32:48 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-microsoft.it.po 13 Jun 2021 08:31:01 -0000 1.177
+++ malware-microsoft.it.po 15 Jul 2021 06:32:48 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -452,6 +452,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-microsoft.ja-diff.html 1 Jul 2021 02:03:53 -0000 1.94
+++ malware-microsoft.ja-diff.html 15 Jul 2021 06:32:48 -0000 1.95
@@ -256,38 +256,51 @@
<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
- they do not count as malware. We mention</em></ins></span> them to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>refute the
+ they do not count as malware. We mention</em></ins></span> them to <span
class="removed"><del><strong>replace</strong></del></span> <span
class="inserted"><ins><em>refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft</em></ins></span> Windows <span
class="removed"><del><strong>7</strong></del></span> <span
class="inserted"><ins><em>vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating
system</a></em></ins></span> and <span
class="removed"><del><strong>8</strong></del></span> <span
class="inserted"><ins><em>install programs, view and delete data, or even
create new user accounts</em></ins></span> with <span
class="removed"><del><strong>all-spying</strong></del></span> <span
class="inserted"><ins><em>full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p>
+
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202103050">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
+ <p>At least 30 thousand organizations</em></ins></span>
+ in <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>the United States are newly “<a
+ href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes</em></ins></span> and <span
class="removed"><del><strong>8</strong></del></span> <span
class="inserted"><ins><em>vulnerabilities in the
+ is unclear whether there are other holes</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on</strong></del></span>
<span class="inserted"><ins><em>vulnerabilities in the
program or not but history and experience tells us it wouldn't be
- the last disaster</em></ins></span> with <span
class="removed"><del><strong>all-spying</strong></del></span> <span
class="inserted"><ins><em>proprietary programs.</p>
+ the last disaster with proprietary programs.</p>
</li>
<li id="M202102110">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Researchers at the security firm SentinelOne discovered a <a
+ <p>Researchers at the security firm SentinelOne
discovered</em></ins></span> a <span class="removed"><del><strong>flag
+ that said whether to “upgrade” to</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
- flaw in proprietary program Microsoft</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p>
-
- <p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>Defender that lurked
- undetected for 12 years</a>. If the program</em></ins></span> was
<span class="inserted"><ins><em>free (as</em></ins></span> in <span
class="removed"><del><strong>fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>freedom),
- more people would have had</em></ins></span> a <span
class="removed"><del><strong>flag
- that said whether to “upgrade”</strong></del></span> <span
class="inserted"><ins><em>chance</em></ins></span> to <span
class="removed"><del><strong>Windows 10 when users
- had turned</strong></del></span> <span class="inserted"><ins><em>notice
the problem, therefore,</em></ins></span>
+ flaw in proprietary program Microsoft</em></ins></span> Windows <span
class="removed"><del><strong>10 when users</strong></del></span> <span
class="inserted"><ins><em>Defender that lurked
+ undetected for 12 years</a>. If the program was free (as in freedom),
+ more people would have</em></ins></span> had <span
class="removed"><del><strong>turned</strong></del></span> <span
class="inserted"><ins><em>a chance to notice the problem,
therefore,</em></ins></span>
it <span class="removed"><del><strong>off.</p>
<p>Later on,</strong></del></span> <span
class="inserted"><ins><em>could've been fixed a lot sooner.</p>
@@ -541,7 +554,10 @@
Microsoft is</strong></del></span> <span class="inserted"><ins><em>8 cease
to function on certain new computers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
repeatedly nagging many users</strong></del></span>
<span
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
- forcing their owners</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>switch to Windows 10</a>.</p>
+ forcing their owners to switch</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> Windows <span
class="removed"><del><strong>10</a>.
+ </p></li>
+
+<li><p></strong></del></span> <span
class="inserted"><ins><em>10</a>.</p>
</li>
<li id="M201704134">
@@ -549,10 +565,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.
- </p></li>
-
-<li><p></strong></del></span> <span class="inserted"><ins><em>7
and 8 on recent processors</a>
+ has dropped support for Windows 7 and 8 on recent processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons</em></ins></span>
Microsoft <span class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>might
@@ -579,9 +592,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- jeopardize important operations</em></ins></span> in <span
class="inserted"><ins><em>regions of the world with poor
+ jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out that this “upgrade” was in fact a <a
+ found out that this “upgrade” was</em></ins></span> in <span
class="inserted"><ins><em>fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -737,8 +750,8 @@
<p>Google, Apple, and</em></ins></span> Microsoft <span
class="inserted"><ins><em>(and probably some other companies)</em></ins></span>
<a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
+blatantly disregards user choice</strong></del></span> <span
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343">are
+ collecting people's access points</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>GPS coordinates (which can
identify people's precise location) even if their GPS is turned
off</a>, without the person's consent, using proprietary software
implemented in person's smartphone. Though merely asking for permission
@@ -1028,8 +1041,7 @@
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
- key</em></ins></span> in Windows</a>, <span
class="removed"><del><strong>introduced to
- cater</strong></del></span> <span class="inserted"><ins><em>whose functions
we don't know.</p>
+ key</em></ins></span> in Windows</a>, <span
class="removed"><del><strong>introduced</strong></del></span> <span
class="inserted"><ins><em>whose functions we don't know.</p>
</li>
</ul>
@@ -1037,7 +1049,8 @@
<h3 id="tethers">Tethers</h3>
<p>Tethers are functionalities that require constant (or very frequent)
-connection to a server.</p>
+connection</em></ins></span> to
+ <span class="removed"><del><strong>cater</strong></del></span> <span
class="inserted"><ins><em>a server.</p>
<ul class="blurbs">
<li id="M201708310">
@@ -1186,7 +1199,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/01 02:03:53 $
+$Date: 2021/07/15 06:32:48 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- malware-microsoft.ja.po 13 Jun 2021 08:31:01 -0000 1.156
+++ malware-microsoft.ja.po 15 Jul 2021 06:32:48 -0000 1.157
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -365,6 +365,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- malware-microsoft.pot 13 Jun 2021 08:31:01 -0000 1.114
+++ malware-microsoft.pot 15 Jul 2021 06:32:48 -0000 1.115
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -254,6 +254,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can
"
+"allow crackers to remotely gain access to the operating system</a> and "
+"install programs, view and delete data, or even create new user accounts "
+"with full user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/\">holes
"
Index: malware-microsoft.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pt-br.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-microsoft.pt-br.po 26 Jun 2021 14:59:56 -0000 1.2
+++ malware-microsoft.pt-br.po 15 Jul 2021 06:32:48 -0000 1.3
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -330,6 +331,31 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- malware-microsoft.ru.po 13 Jun 2021 15:59:19 -0000 1.267
+++ malware-microsoft.ru.po 15 Jul 2021 06:32:48 -0000 1.268
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-06-13 08:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -336,6 +337,31 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- nl.po 4 Jul 2021 05:31:21 -0000 1.327
+++ nl.po 15 Jul 2021 06:32:48 -0000 1.328
@@ -449,6 +449,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -683,12 +714,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -9085,9 +9110,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2019,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-4-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -9095,8 +9120,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -10564,6 +10589,20 @@
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
#~ "As of March, 2021, the pages in this directory list around 500 instances "
#~ "of malicious functionalities (with more than 590 references to back them "
#~ "up), but there are surely thousands more we don't know about."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- pl.po 4 Jul 2021 05:31:21 -0000 1.326
+++ pl.po 15 Jul 2021 06:32:48 -0000 1.327
@@ -438,6 +438,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -672,12 +703,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -8518,8 +8543,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- pot 4 Jul 2021 05:31:21 -0000 1.325
+++ pot 15 Jul 2021 06:32:48 -0000 1.326
@@ -368,6 +368,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -602,12 +633,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -8036,8 +8061,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
Index: potential-malware.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- potential-malware.de-diff.html 8 Jun 2021 08:44:43 -0000 1.16
+++ potential-malware.de-diff.html 15 Jul 2021 06:32:48 -0000 1.17
@@ -70,7 +70,14 @@
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
- <li <span class="inserted"><ins><em>id="M201903280">
+ <li <span class="inserted"><ins><em>id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
+ <li id="M201903280">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Car companies are coming up with a list of clever reasons why
<a
@@ -213,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/08 08:44:43 $
+$Date: 2021/07/15 06:32:48 $
<!-- timestamp end -->
</p>
</div>
Index: potential-malware.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- potential-malware.de.po 31 May 2021 13:39:55 -0000 1.18
+++ potential-malware.de.po 15 Jul 2021 06:32:48 -0000 1.19
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: potential-malware.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -136,6 +136,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
Index: potential-malware.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.es.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- potential-malware.es.po 30 Apr 2021 09:12:16 -0000 1.14
+++ potential-malware.es.po 15 Jul 2021 06:32:48 -0000 1.15
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-01-19 10:24+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -94,6 +95,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
Index: potential-malware.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- potential-malware.fr.po 31 May 2021 21:09:18 -0000 1.26
+++ potential-malware.fr.po 15 Jul 2021 06:32:48 -0000 1.27
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Potential Malware - GNU Project - Free Software Foundation"
@@ -87,6 +88,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
Index: potential-malware.pot
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- potential-malware.pot 18 Jan 2021 13:10:31 -0000 1.14
+++ potential-malware.pot 15 Jul 2021 06:32:48 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -77,6 +77,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\">Advertising
"
+"companies are experimenting to manipulate people's minds</a> and impose a "
+"new way of advertising by altering their dreams. This “targeted dream "
+"incubation” would trigger “refreshing dreams” of the "
+"product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a "
"href=\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html\">
"
"they “have to” put cameras and microphones in the car</a>."
Index: potential-malware.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- potential-malware.pt-br.po 26 Jun 2021 14:42:19 -0000 1.1
+++ potential-malware.pt-br.po 15 Jul 2021 06:32:48 -0000 1.2
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: potential-malware.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -88,6 +89,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
Index: potential-malware.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- potential-malware.ru.po 1 Jun 2021 15:27:22 -0000 1.32
+++ potential-malware.ru.po 15 Jul 2021 06:32:48 -0000 1.33
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Potential Malware - GNU Project - Free Software Foundation"
@@ -91,6 +92,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.de-diff.html 28 Jun 2021 14:00:58 -0000 1.81
+++ proprietary-insecurity.de-diff.html 15 Jul 2021 06:32:49 -0000 1.82
@@ -97,6 +97,20 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -302,8 +316,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
+ A disasterous security bug</a> touches millions of products
in</em></ins></span> the <span class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span>
+ <span class="inserted"><ins><em>Internet of Stings.</p>
<p>As a result, anyone can sting the user, not only the
manufacturer.</p>
@@ -325,10 +342,7 @@
<p>Riot Games' new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
on system boot at kernel level</a> on Windows. It is insecure
software
- that increases</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>attack
surface of the operating system.</p>
+ that increases the attack surface of the operating system.</p>
</li>
<li id="M201912170">
@@ -644,16 +658,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p>
-</li>
-<li>
+ </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
+full of gross security faults</a>.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1058,19 +1072,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1191,8 +1205,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -1250,20 +1264,20 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
</li>
- <li id="M201402210">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1455,7 +1469,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 14:00:58 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-insecurity.de.po 28 Jun 2021 14:00:58 -0000 1.179
+++ proprietary-insecurity.de.po 15 Jul 2021 06:32:49 -0000 1.180
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -165,6 +165,40 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-Note-]{+<small>Please note+} that [-this article misuses-] the [-term <a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>
+# | referring-] {+article wrongly refers+} to [-crackers.-] {+crackers as
+# | “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "Note that this article misuses the term <a href=\"/philosophy/words-to-"
+#| "avoid.html#Hacker\">“hackers”</a> referring to crackers."
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"Hinweis: Dieser Artikel missbraucht den Begriff <em><a href=\"/philosophy/"
+"words-to-avoid#Hacker\">âHackerâ</a></em> mit Bezug auf <em>Cracker</em>."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -242,24 +276,6 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
-# | [-Note-]{+<small>Please note+} that [-this article misuses-] the [-term <a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>
-# | referring-] {+article wrongly refers+} to [-crackers.-] {+crackers as
-# | “<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "Note that this article misuses the term <a href=\"/philosophy/words-to-"
-#| "avoid.html#Hacker\">“hackers”</a> referring to crackers."
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"Hinweis: Dieser Artikel missbraucht den Begriff <em><a href=\"/philosophy/"
-"words-to-avoid#Hacker\">âHackerâ</a></em> mit Bezug auf <em>Cracker</em>."
-
-#. type: Content of: <div><div><ul><li><p>
msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-insecurity.es.po 29 Jun 2021 08:32:58 -0000 1.109
+++ proprietary-insecurity.es.po 15 Jul 2021 06:32:49 -0000 1.110
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -125,6 +126,31 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a></small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -250,15 +276,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a></small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary-insecurity.fr.po 30 Jun 2021 18:02:25 -0000 1.259
+++ proprietary-insecurity.fr.po 15 Jul 2021 06:32:49 -0000 1.260
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-28 20:57+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -125,6 +126,30 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -247,14 +272,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-insecurity.it-diff.html 28 Jun 2021 14:00:58 -0000 1.94
+++ proprietary-insecurity.it-diff.html 15 Jul 2021 06:32:49 -0000 1.95
@@ -72,8 +72,8 @@
them to show that proprietary software</em></ins></span> is <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>not immune</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs, and is
often quite sloppy.</p>
-<p>All complex programs, whether</em></ins></span> free <span
class="inserted"><ins><em>or proprietary, contain bugs. What
-makes bugs more dangerous in proprietary</em></ins></span> software <span
class="inserted"><ins><em>is that users are
+<p>All complex programs, whether</em></ins></span> free <span
class="removed"><del><strong>software with a fictitious idea
of</strong></del></span> <span class="inserted"><ins><em>or proprietary,
contain bugs. What
+makes bugs more dangerous in</em></ins></span> proprietary software <span
class="inserted"><ins><em>is that users are
<em>helpless to fix any security problems that arise</em>. Keeping
the users helpless is what's culpable about proprietary software.</p>
@@ -82,19 +82,33 @@
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
+to serve</em></ins></span> as <span
class="removed"><del><strong>perfect,</strong></del></span> <span
class="inserted"><ins><em>specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited</em></ins></span> but <span
class="inserted"><ins><em>Windows users should still wait
+ for Microsoft to fix</em></ins></span> the <span
class="removed"><del><strong>press often implicitly</strong></del></span> <span
class="inserted"><ins><em>flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
+ users' smartphones</a>. The company behind it</em></ins></span> does
<span class="inserted"><ins><em>whatever it wants
and collects whatever data it can.</p>
</li>
@@ -113,12 +127,12 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A motorcycle company named Klim is selling airbag
- vests</em></ins></span> with <span class="inserted"><ins><em>different
payment methods, one of them is through</em></ins></span> a <span
class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em><a
+ vests with different payment methods, one of them is through a <a
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment">proprietary
- subscription-based option that will block the vest from inflating if
+ subscription-based option</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>will block the vest from inflating if
the payments don't go through</a>.</p>
- <p>They say there is a 30-days grace period if you miss a payment
+ <p>They say there is</em></ins></span> a <span
class="removed"><del><strong>security hole in</strong></del></span> <span
class="inserted"><ins><em>30-days grace period if you miss</em></ins></span> a
<span class="removed"><del><strong>free program</strong></del></span> <span
class="inserted"><ins><em>payment
but the grace period is no excuse to the insecurity.</p>
</li>
@@ -132,7 +146,7 @@
<p>What creates the opportunity to try this is the fact that these
companies are already snooping on users' private activities. That
- in turn is due to people's use of nonfree software which snoops,
+ in turn</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
@@ -142,27 +156,30 @@
<p>A zero-day vulnerability in Zoom which <a
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
be used to launch remote code execution (RCE) attacks</a> has been
- disclosed by researchers. The researchers demonstrated a three-bug
- attack chain that caused an RCE on a target machine, all this without
- any form</em></ins></span> of <span class="inserted"><ins><em>user
interaction.</p>
+ disclosed by researchers.</em></ins></span> The
+<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>researchers demonstrated a three-bug
+ attack chain</em></ins></span> that <span class="inserted"><ins><em>caused
an RCE on a target machine, all this without
+ any form of user interaction.</p>
</li>
<li id="M202103090">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's</em></ins></span> proprietary software <span
class="inserted"><ins><em>are cracked</a> by a major security
+ company's</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by a major security
breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
+ gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
Verkada's cameras.</p>
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
+ <p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
+
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span>
+ to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>the public</a> for gyms, stores, hospitals,
jails, and schools to
hand “security” footage to a company from which the government
can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
- wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect,</strong></del></span> <span
class="inserted"><ins><em>“<a
+ wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
@@ -173,20 +190,19 @@
in the United States are newly “<a
href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
+ in Microsoft's</em></ins></span> proprietary <span
class="removed"><del><strong>software</strong></del></span> <span
class="inserted"><ins><em>email software, named Microsoft 365</a>. It
is unclear whether there are other holes and vulnerabilities in the
- program or not</em></ins></span> but <span
class="inserted"><ins><em>history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
+ program or not but history and experience tells us it wouldn't be
+ the last disaster</em></ins></span> with <span
class="inserted"><ins><em>proprietary programs.</p>
</li>
<li id="M202102110">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Researchers at</em></ins></span> the <span
class="removed"><del><strong>press often implicitly does
-that whenever a</strong></del></span> security <span
class="removed"><del><strong>hole in</strong></del></span> <span
class="inserted"><ins><em>firm SentinelOne discovered</em></ins></span> a <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Researchers at the security firm SentinelOne
discovered</em></ins></span> a <span class="removed"><del><strong>fictitious
idea of</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
- flaw in proprietary</em></ins></span> program <span
class="removed"><del><strong>is discovered.</strong></del></span> <span
class="inserted"><ins><em>Microsoft Windows Defender that lurked
- undetected for 12 years</a>. If the program was free (as in freedom),
+ flaw in proprietary program Microsoft Windows Defender that lurked
+ undetected for 12 years</a>. If the program was</em></ins></span>
free <span class="inserted"><ins><em>(as in freedom),
more people would have had a chance to notice the problem, therefore,
it could've been fixed a lot sooner.</p>
</li>
@@ -197,11 +213,10 @@
<p>A cracker <a
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
control of people's internet-connected chastity cages and demanded
- ransom</a>.</em></ins></span> The
-<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>chastity cages are being controlled by a
proprietary
+ ransom</a>. The chastity cages are being controlled by a proprietary
app (mobile program).</p>
- <p><small>(Please note</em></ins></span> that <span
class="inserted"><ins><em>the article
+ <p><small>(Please note that the article
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
@@ -235,13 +250,14 @@
<p>United States officials are facing
one of biggest crackings against them in years, when <a
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
- code was sneaked into SolarWinds'</em></ins></span> proprietary software
<span class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>named
+ code was sneaked into SolarWinds' proprietary</em></ins></span> software
<span class="inserted"><ins><em>named
Orion</a>. Crackers got access to networks when users downloaded
a tainted software update. Crackers were able to monitor internal
emails at some of the top agencies in the US.</p>
<p><small>(Please note that the article
- wrongly refers to crackers as "<a
+ wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
+program has bugs,</strong></del></span> <span class="inserted"><ins><em>"<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
@@ -251,12 +267,10 @@
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
caught collecting sensitive personal data</a> that can be used for
- lifetime tracking of users,</em></ins></span> and <span
class="inserted"><ins><em>putting them in danger. More than 1.4
+ lifetime tracking of users,</em></ins></span> and <span
class="removed"><del><strong>any system, free or
proprietary,</strong></del></span> <span class="inserted"><ins><em>putting them
in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
- users' privacy</em></ins></span> is <span
class="removed"><del><strong>often quite sloppy.</p>
-
-<p>It would</strong></del></span> <span
class="inserted"><ins><em>jeopardized by this surveillance tool. Data collected
- by Baidu may</em></ins></span> be <span
class="removed"><del><strong>equally incorrect</strong></del></span> <span
class="inserted"><ins><em>handed over</em></ins></span> to <span
class="removed"><del><strong>compare proprietary</strong></del></span> <span
class="inserted"><ins><em>the Chinese government, possibly
+ users' privacy is jeopardized by this surveillance tool. Data collected
+ by Baidu</em></ins></span> may <span
class="removed"><del><strong>have</strong></del></span> <span
class="inserted"><ins><em>be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -279,7 +293,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Samsung is forcing its smartphone users in Hong Kong (and Macau)
<a
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/">to
- use a public DNS in Mainland China</a>, using</em></ins></span>
software <span class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>update released
+ use a public DNS in Mainland China</a>, using software update
released
in September 2020, which causes many unease and privacy concerns.</p>
</li>
@@ -297,10 +311,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
+ A disasterous</em></ins></span> security <span
class="removed"><del><strong>errors. To err</strong></del></span> <span
class="inserted"><ins><em>bug</a> touches millions of products in the
Internet of Stings.</p>
- <p>As</em></ins></span> a <span
class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em>result, anyone can sting the user, not only the
+ <p>As a result, anyone can sting the user, not only the
manufacturer.</p>
</li>
@@ -310,26 +324,25 @@
<p>The proprietary program Microsoft Teams' insecurity <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif">could
have let a malicious GIF steal user data from Microsoft Teams
- accounts</a>, possibly across an entire company, and taken
control</em></ins></span>
- of <span class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>“an organization's entire roster of Teams
accounts.”</p>
+ accounts</a>, possibly across an entire company, and taken control
+ of “an organization's entire roster of Teams
accounts.”</p>
</li>
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat is malware; <a
+ <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="removed"><del><strong>human,</strong></del></span> <span
class="inserted"><ins><em>malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It is
insecure</em></ins></span> software
- <span class="inserted"><ins><em>that increases the attack surface of the
operating system.</p>
+ on system boot at kernel level</a> on Windows. It is insecure
software
+ that increases the attack surface of the operating system.</p>
</li>
<li id="M201912170">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some security breakers (wrongly referred in this
article</em></ins></span> as <span class="removed"><del><strong>perfect. Every
nontrivial
-program has bugs, and any</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Some security breakers (wrongly referred in this article as <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary</em></ins></span> system,
<span class="removed"><del><strong>free or proprietary, may
have</strong></del></span> <span class="inserted"><ins><em>and <a
+ managed to interfere the Amazon Ring proprietary system, and <a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
@@ -338,7 +351,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-tethered Amazon Ring had
- a</em></ins></span> security <span class="removed"><del><strong>errors.
To err is human,</strong></del></span> <span
class="inserted"><ins><em>vulnerability that enabled attackers to <a
+ a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
through connected surveillance devices.</p>
@@ -1123,17 +1136,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1166,8 +1179,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -1224,20 +1237,20 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
</li>
- <li id="M201402210">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1430,7 +1443,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/28 14:00:58 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary-insecurity.it.po 28 Jun 2021 14:00:58 -0000 1.196
+++ proprietary-insecurity.it.po 15 Jul 2021 06:32:49 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -155,6 +155,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -233,12 +255,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-insecurity.ja-diff.html 1 Jul 2021 02:03:53 -0000 1.115
+++ proprietary-insecurity.ja-diff.html 15 Jul 2021 06:32:49 -0000 1.116
@@ -88,6 +88,20 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user
accounts</em></ins></span> with <span class="inserted"><ins><em>full user
rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
<li id="M202106030">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -103,7 +117,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
- is moving its Chinese customers' iCloud data to a datacenter controlled
+ is moving its Chinese customers' iCloud data to</em></ins></span> a
+<span class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em>datacenter controlled
by the Chinese government</a>. Apple is already storing the
encryption
keys on these servers, obeying Chinese authority, making all Chinese
user data available to the government.</p>
@@ -113,8 +128,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A motorcycle company named Klim is selling airbag
- vests</em></ins></span> with <span class="inserted"><ins><em>different
payment methods, one of them is through</em></ins></span> a
-<span class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em><a
+ vests with different payment methods, one</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>them is through a <a
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment">proprietary
subscription-based option that will block the vest from inflating if
the payments don't go through</a>.</p>
@@ -133,7 +147,7 @@
<p>What creates the opportunity to try this is the fact that these
companies are already snooping on users' private activities. That
- in turn is due to people's use</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>nonfree</em></ins></span> software <span
class="removed"><del><strong>as perfect. Every nontrivial
program</strong></del></span> <span class="inserted"><ins><em>which snoops,
+ in turn is due to people's use of nonfree</em></ins></span> software <span
class="removed"><del><strong>as perfect. Every nontrivial
program</strong></del></span> <span class="inserted"><ins><em>which snoops,
and online dis-services which snoop.</p>
</li>
@@ -154,11 +168,11 @@
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
company's proprietary software are cracked</a> by a major security
breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
+ gyms, hospitals, jails, schools, and police stations that have used
Verkada's cameras.</p>
<p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
+ to the public</a> for gyms, stores, hospitals,
jails,</em></ins></span> and <span class="inserted"><ins><em>schools to
hand “security” footage to a company from which the government
can
collect it at</em></ins></span> any <span
class="removed"><del><strong>system, free</strong></del></span> <span
class="inserted"><ins><em>time, without even telling them.</p>
@@ -315,9 +329,9 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat is malware; <a
+ <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="inserted"><ins><em>malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It</em></ins></span>
is <span class="inserted"><ins><em>insecure software
+ on system boot at kernel level</a> on Windows. It is insecure
software
that increases the attack surface of the operating system.</p>
</li>
@@ -382,9 +396,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ not to allow</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
@@ -395,7 +410,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>, and the app censorship prevents
security
+ ducks for other attackers</a>,</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>the app censorship prevents security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
@@ -448,7 +463,7 @@
<p>Since the beginning of 2017, <a
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android
phones have been collecting the addresses of nearby cellular
- towers</a>,</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when location services are disabled, and sending
+ towers</a>, even when location services are disabled, and sending
that data back to Google.</p>
</li>
@@ -559,8 +574,7 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
+ find those accounts and use them to get into users'
cameras</a>.</p>
</li>
<li id="M201706050">
@@ -574,7 +588,7 @@
<p>The vulnerability allowed a cracker to access
the computer's Intel Active Management Technology (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface with an empty password</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>gave administrative
+ web interface with an empty password and gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
other privileges.</p>
@@ -1050,17 +1064,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1159,20 +1173,20 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402210">
+ <li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1357,7 +1371,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/01 02:03:53 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary-insecurity.ja.po 28 Jun 2021 14:00:58 -0000 1.168
+++ proprietary-insecurity.ja.po 15 Jul 2021 06:32:49 -0000 1.169
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -131,6 +131,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -209,12 +231,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary-insecurity.pot 28 Jun 2021 14:00:58 -0000 1.134
+++ proprietary-insecurity.pot 15 Jul 2021 06:32:49 -0000 1.135
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -96,6 +96,28 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can
"
+"allow crackers to remotely gain access to the operating system</a> and "
+"install programs, view and delete data, or even create new user accounts "
+"with full user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a "
"href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/\">TikTok
"
"apps collect biometric identifiers and biometric information from users' "
@@ -174,12 +196,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/\">holes
"
Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-insecurity.pt-br.po 30 Jun 2021 12:00:35 -0000 1.3
+++ proprietary-insecurity.pt-br.po 15 Jul 2021 06:32:49 -0000 1.4
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -117,6 +118,31 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -237,15 +263,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-insecurity.ru.po 28 Jun 2021 15:59:24 -0000 1.305
+++ proprietary-insecurity.ru.po 15 Jul 2021 06:32:49 -0000 1.306
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-06-28 13:55+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -121,6 +122,31 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
@@ -243,15 +269,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"At least 30 thousand organizations in the United States are newly “<a "
"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
Index: proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary-manipulation.es.po 8 Jul 2021 09:33:22 -0000 1.35
+++ proprietary-manipulation.es.po 15 Jul 2021 06:32:49 -0000 1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-08 11:07+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -118,6 +119,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
Index: proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-manipulation.fr.po 4 Jul 2021 19:00:31 -0000 1.32
+++ proprietary-manipulation.fr.po 15 Jul 2021 06:32:49 -0000 1.33
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-04 20:56+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -112,6 +113,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
Index: proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-manipulation.pot 4 Jul 2021 05:31:22 -0000 1.17
+++ proprietary-manipulation.pot 15 Jul 2021 06:32:49 -0000 1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,6 +94,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\">Advertising
"
+"companies are experimenting to manipulate people's minds</a> and impose a "
+"new way of advertising by altering their dreams. This “targeted dream "
+"incubation” would trigger “refreshing dreams” of the "
+"product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a "
"href=\"https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/\">locked
"
"people out of basic features of people's treadmills by a software "
Index: proprietary-manipulation.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pt-br.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-manipulation.pt-br.po 11 Jul 2021 23:33:27 -0000 1.3
+++ proprietary-manipulation.pt-br.po 15 Jul 2021 06:32:49 -0000 1.4
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -110,6 +111,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
Index: proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-manipulation.ru.po 5 Jul 2021 10:00:43 -0000 1.25
+++ proprietary-manipulation.ru.po 15 Jul 2021 06:32:49 -0000 1.26
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -113,6 +114,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.de-diff.html 4 Jul 2021 05:31:22 -0000 1.284
+++ proprietary.de-diff.html 15 Jul 2021 06:32:49 -0000 1.285
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,14 +65,14 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>July,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 610 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -140,15 +140,15 @@
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -224,6 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -268,28 +289,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -353,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:22 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary.de.po 4 Jul 2021 05:31:22 -0000 1.301
+++ proprietary.de.po 15 Jul 2021 06:32:49 -0000 1.302
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -106,9 +106,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -116,8 +116,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -480,6 +480,49 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
+# | term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+wrongly refers to crackers as “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -527,25 +570,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
@@ -669,18 +693,6 @@
#, fuzzy
#~| msgid ""
-#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
-#~ msgid ""
-#~ "<small>Please note that the article wrongly refers to crackers as “"
-#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
-#~ "small>"
-#~ msgstr ""
-#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
-#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
-#, fuzzy
-#~| msgid ""
#~| "The Amazon “smart” TV is <a href=\"http://www.theguardian."
#~| "com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-"
#~| "listening-surveillance\"> snooping all the time</a>."
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.486
retrieving revision 1.487
diff -u -b -r1.486 -r1.487
--- proprietary.es.po 8 Jul 2021 09:33:22 -0000 1.486
+++ proprietary.es.po 15 Jul 2021 06:32:49 -0000 1.487
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -100,9 +101,18 @@
"de ser engañado."
#. type: Content of: <div><p>
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Hasta junio de 2021, las páginas de este directorio ofrecen una lista de "
@@ -341,6 +351,50 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -418,38 +472,6 @@
"estas aplicaciones siguen el rastro de los usuarios por diferentes "
"plataformas."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">Las aplicaciones de TikTok recogen identificadores e "
-"información biométricos de los usuarios de <cite>smartphones</cite></a>, "
-"además de todo otro tipo de datos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"Google, Apple y Microsoft (y probablemente algunas otras compañÃas más) <a
"
-"href=\"https://www.lifewire.com/wifi-positioning-system-1683343\">obtienen "
-"los datos correspondientes a los puntos de acceso y coordenadas GPS de los "
-"usuarios (lo que permite determinar con precisión su ubicación), incluso "
-"cuando el GPS está desactivado</a>. Utilizan para ello el software privativo
"
-"implementado en el <cite>smartphone</cite>, y lo hacen sin el consentimiento "
-"de la persona. No obstante, tampoco solicitar permiso bastarÃa para "
-"legitimarlo."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -528,3 +550,34 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">Las aplicaciones de TikTok recogen identificadores e "
+#~ "información biométricos de los usuarios de <cite>smartphones</cite></a>,
"
+#~ "además de todo otro tipo de datos."
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "Google, Apple y Microsoft (y probablemente algunas otras compañÃas más)
"
+#~ "<a href=\"https://www.lifewire.com/wifi-positioning-"
+#~ "system-1683343\">obtienen los datos correspondientes a los puntos de "
+#~ "acceso y coordenadas GPS de los usuarios (lo que permite determinar con "
+#~ "precisión su ubicación), incluso cuando el GPS está desactivado</a>. "
+#~ "Utilizan para ello el software privativo implementado en el "
+#~ "<cite>smartphone</cite>, y lo hacen sin el consentimiento de la persona. "
+#~ "No obstante, tampoco solicitar permiso bastarÃa para legitimarlo."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.513
retrieving revision 1.514
diff -u -b -r1.513 -r1.514
--- proprietary.fr.po 4 Jul 2021 07:19:56 -0000 1.513
+++ proprietary.fr.po 15 Jul 2021 06:32:49 -0000 1.514
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-04 09:19+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -99,9 +100,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"En juin 2021, les pages de ce répertoire dénombraient à peu près 500 cas
de "
@@ -338,6 +348,39 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -413,37 +456,6 @@
"et des cookies pour suivre ses activités. Certaines de ces applis traquent "
"les utilisateurs sur différentes plateformes."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">L'appli TikTok pour smartphone collecte des informations et "
-"identifiants biométriques</a>. Son éditeur récupère tout ce qui est à sa
"
-"portée et fait ce qu'il veut avec."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"Google, Apple et Microsoft (ainsi que d'autres, probablement) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">enregistrent "
-"les points d'accès wifi et les coordonnées GPS des gens</a>, ce qui permet "
-"de les localiser précisément même si le GPS est éteint, ceci sans leur "
-"consentement et en utilisant le logiciel privateur installé dans leur "
-"téléphone. Même si on leur demandait la permission, cela ne légitimerait
pas "
-"nécessairement cette pratique."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -518,6 +530,36 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">L'appli TikTok pour smartphone collecte des "
+#~ "informations et identifiants biométriques</a>. Son éditeur récupère
tout "
+#~ "ce qui est à sa portée et fait ce qu'il veut avec."
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "Google, Apple et Microsoft (ainsi que d'autres, probablement) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">enregistrent "
+#~ "les points d'accès wifi et les coordonnées GPS des gens</a>, ce qui "
+#~ "permet de les localiser précisément même si le GPS est éteint, ceci
sans "
+#~ "leur consentement et en utilisant le logiciel privateur installé dans "
+#~ "leur téléphone. Même si on leur demandait la permission, cela ne "
+#~ "légitimerait pas nécessairement cette pratique."
+
+#~ msgid ""
#~ "<a href=\"https://www.theverge.com/2018/8/13/17684660/google-turn-off-"
#~ "location-history-data\">Google will track people even if people turn off "
#~ "location history</a>, using Google Maps, weather updates, and browser "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary.it-diff.html 4 Jul 2021 05:31:22 -0000 1.294
+++ proprietary.it-diff.html 15 Jul 2021 06:32:49 -0000 1.295
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>July,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 610 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -139,16 +139,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -223,6 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -267,28 +288,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -352,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:22 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary.it.po 4 Jul 2021 05:31:22 -0000 1.310
+++ proprietary.it.po 15 Jul 2021 06:32:49 -0000 1.311
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -102,9 +102,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -112,8 +112,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -485,6 +485,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -532,25 +563,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary.ja-diff.html 4 Jul 2021 05:31:22 -0000 1.299
+++ proprietary.ja-diff.html 15 Jul 2021 06:32:49 -0000 1.300
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -113,8 +113,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>July,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 610 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -129,8 +129,7 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -142,7 +141,8 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
+ <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
</ul>
</div>
@@ -175,15 +175,15 @@
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,6 +228,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,28 +293,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -357,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:22 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary.ja.po 4 Jul 2021 05:31:22 -0000 1.293
+++ proprietary.ja.po 15 Jul 2021 06:32:49 -0000 1.294
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,8 +100,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -343,6 +343,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -390,25 +421,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary.nl-diff.html 4 Jul 2021 05:31:22 -0000 1.295
+++ proprietary.nl-diff.html 15 Jul 2021 06:32:49 -0000 1.296
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>July,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 610 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -223,6 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -267,28 +288,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -352,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:22 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.nl.po 4 Jul 2021 05:31:22 -0000 1.284
+++ proprietary.nl.po 15 Jul 2021 06:32:49 -0000 1.285
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -104,9 +104,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2019,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-4-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -114,8 +114,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -388,6 +388,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -435,25 +466,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary.pl-diff.html 4 Jul 2021 05:31:22 -0000 1.311
+++ proprietary.pl-diff.html 15 Jul 2021 06:32:49 -0000 1.312
@@ -56,7 +56,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>June, 2021, the pages in this directory list
around 500
-instances of malicious functionalities (with more than 600 references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>July, 2021, the pages in this directory list
around 500
+instances of malicious functionalities (with more than 610 references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -166,19 +166,19 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -222,6 +222,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -266,28 +287,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -351,7 +350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:22 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary.pl.po 4 Jul 2021 05:31:22 -0000 1.276
+++ proprietary.pl.po 15 Jul 2021 06:32:49 -0000 1.277
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -143,8 +143,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
@@ -569,6 +569,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -616,25 +647,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.pot 4 Jul 2021 05:31:22 -0000 1.273
+++ proprietary.pot 15 Jul 2021 06:32:49 -0000 1.274
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,8 +79,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
@@ -280,6 +280,38 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a "
+"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can
"
+"allow crackers to remotely gain access to the operating system</a> and "
+"install programs, view and delete data, or even create new user accounts "
+"with full user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\">Advertising
"
+"companies are experimenting to manipulate people's minds</a> and impose a "
+"new way of advertising by altering their dreams. This “targeted dream "
+"incubation” would trigger “refreshing dreams” of the "
+"product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a "
"href=\"https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/\">locked
"
"people out of basic features of people's treadmills by a software "
@@ -328,26 +360,6 @@
"platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/\">TikTok
"
-"apps collect biometric identifiers and biometric information from users' "
-"smartphones</a>. The company behind it does whatever it wants and collects "
-"whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a "
-"href=\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
-"collecting people's access points and GPS coordinates (which can identify "
-"people's precise location) even if their GPS is turned off</a>, without the "
-"person's consent, using proprietary software implemented in person's "
-"smartphone. Though merely asking for permission would not necessarily "
-"legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.436
retrieving revision 1.437
diff -u -b -r1.436 -r1.437
--- proprietary.pt-br.po 11 Jul 2021 23:33:27 -0000 1.436
+++ proprietary.pt-br.po 15 Jul 2021 06:32:49 -0000 1.437
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 40.0\n"
@@ -97,9 +98,14 @@
"ser mal."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Até junho de 2021, as páginas neste diretório listam quase 500 exemplos de
"
@@ -335,6 +341,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -409,37 +449,6 @@
"cookies para rastrear as atividades do usuário. Alguns desses aplicativos "
"estão rastreando usuários em diferentes plataformas."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">Os aplicativos TikTok coletam identificadores biométricos e "
-"informações biométricas dos smartphones dos usuários</a>. A empresa por
trás "
-"disso faz o que quer e coleta todos os dados que pode."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"Google, Apple e Microsoft (e provavelmente algumas outras empresas) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">estão coletando
"
-"pontos de acesso de pessoas e coordenadas de GPS (que podem identificar as "
-"pessoas localização precisa) mesmo que o GPS esteja desligado</a>, sem o "
-"consentimento da pessoa, usando software proprietário implementado no "
-"smartphone da pessoa. Embora apenas pedir permissão não legitimasse isso "
-"necessariamente."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -515,6 +524,36 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">Os aplicativos TikTok coletam identificadores "
+#~ "biométricos e informações biométricas dos smartphones dos
usuários</a>. A "
+#~ "empresa por trás disso faz o que quer e coleta todos os dados que pode."
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "Google, Apple e Microsoft (e provavelmente algumas outras empresas) <a "
+#~ "href=\"https://www.lifewire.com/wifi-positioning-system-1683343\">estão "
+#~ "coletando pontos de acesso de pessoas e coordenadas de GPS (que podem "
+#~ "identificar as pessoas localização precisa) mesmo que o GPS esteja "
+#~ "desligado</a>, sem o consentimento da pessoa, usando software "
+#~ "proprietário implementado no smartphone da pessoa. Embora apenas pedir "
+#~ "permissão não legitimasse isso necessariamente."
+
+#~ msgid ""
#~ "<a href=\"https://www.theverge.com/2018/8/13/17684660/google-turn-off-"
#~ "location-history-data\">Google will track people even if people turn off "
#~ "location history</a>, using Google Maps, weather updates, and browser "
@@ -805,16 +844,6 @@
#~ "Illegally-Tracked-Consumers-New-Suits-Allege\"> sendo processado</a> por "
#~ "isso."
-#, fuzzy
-#~ msgid ""
-#~ "<small>Please note that the article wrongly refers to crackers as “"
-#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
-#~ "small>"
-#~ msgstr ""
-#~ "<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</"
-#~ "em> como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</"
-#~ "a>â.)</small>"
-
#~ msgid ""
#~ "Many cr…apps, developed by various companies for various "
#~ "organizations, do <a href=\"https://www.expressvpn.com/digital-security-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.532
retrieving revision 1.533
diff -u -b -r1.532 -r1.533
--- proprietary.ru.po 5 Jul 2021 10:00:43 -0000 1.532
+++ proprietary.ru.po 15 Jul 2021 06:32:49 -0000 1.533
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -101,9 +102,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Ðа иÑÐ½Ñ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
@@ -340,6 +350,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -414,37 +458,6 @@
"Ñакже кÑки Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð´ÐµÐ¹ÑÑвий
полÑзоваÑелÑ. ÐекоÑоÑÑе из ÑÑиÑ
"
"пÑиложений оÑÑлеживаÑÑ Ð¿Ð¾Ð»ÑзоваÑелей
ÑÑÐ°Ð·Ñ Ð½Ð° неÑколÑкиÑ
плаÑÑоÑмаÑ
."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">ÐÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ TikTok ÑобиÑаÑÑ
биомеÑÑиÑеÑкие иденÑиÑикаÑоÑÑ Ð¸ "
-"биомеÑÑиÑеÑкÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¸Ð· ÑмаÑÑÑонов
полÑзоваÑелей</a>. ÐомпаниÑ, "
-"вÑпÑÑкаÑÑÐ°Ñ Ð¿ÑиложениÑ, делаеÑ, ÑÑо Ñ
оÑеÑ,
и ÑобиÑÐ°ÐµÑ Ð²Ñе даннÑе, какие "
-"можеÑ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"Google, Apple и Microsoft (а веÑоÑÑно, и некоÑоÑÑе
дÑÑгие компании) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">ÑобиÑаÑÑ
ÑоÑки "
-"доÑÑÑпа и кооÑдинаÑÑ GPS лÑдей (ÑÑо
опÑеделÑÐµÑ ÑоÑное меÑÑоположение лÑдей), "
-"даже еÑли иÑ
GPS оÑклÑÑен</a>, без ÑоглаÑиÑ
Ñеловека Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
-"пÑогÑамм, ÑеализованнÑÑ
в его ÑмаÑÑÑоне.
ХоÑÑ ÐµÑли Ð±Ñ Ð¾Ð½Ð¸ пÑоÑÑо ÑпÑаÑивали "
-"Ð±Ñ ÑоглаÑиÑ, ÑÑо не обÑзаÑелÑно делало бÑ
ÑÑо пÑавомеÑнÑм."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -522,6 +535,37 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">ÐÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ TikTok ÑобиÑаÑÑ
биомеÑÑиÑеÑкие "
+#~ "иденÑиÑикаÑоÑÑ Ð¸ биомеÑÑиÑеÑкÑÑ
инÑоÑмаÑÐ¸Ñ Ð¸Ð· ÑмаÑÑÑонов полÑзоваÑелей</"
+#~ "a>. ÐомпаниÑ, вÑпÑÑкаÑÑÐ°Ñ Ð¿ÑиложениÑ,
делаеÑ, ÑÑо Ñ
оÑеÑ, и ÑобиÑÐ°ÐµÑ Ð²Ñе "
+#~ "даннÑе, какие можеÑ."
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "Google, Apple и Microsoft (а веÑоÑÑно, и некоÑоÑÑе
дÑÑгие компании) <a "
+#~ "href=\"https://www.lifewire.com/wifi-positioning-"
+#~ "system-1683343\">ÑобиÑаÑÑ ÑоÑки доÑÑÑпа и
кооÑдинаÑÑ GPS лÑдей (ÑÑо "
+#~ "опÑеделÑÐµÑ ÑоÑное меÑÑоположение
лÑдей), даже еÑли иÑ
GPS оÑклÑÑен</a>, "
+#~ "без ÑоглаÑÐ¸Ñ Ñеловека Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ
неÑвободнÑÑ
пÑогÑамм, ÑеализованнÑÑ
в его "
+#~ "ÑмаÑÑÑоне. ХоÑÑ ÐµÑли Ð±Ñ Ð¾Ð½Ð¸ пÑоÑÑо
ÑпÑаÑивали Ð±Ñ ÑоглаÑиÑ, ÑÑо не "
+#~ "обÑзаÑелÑно делало Ð±Ñ ÑÑо пÑавомеÑнÑм."
+
+#~ msgid ""
#~ "<a href=\"https://www.theverge.com/2018/8/13/17684660/google-turn-off-"
#~ "location-history-data\">Google will track people even if people turn off "
#~ "location history</a>, using Google Maps, weather updates, and browser "
@@ -776,15 +820,6 @@
#~ "ÑобиÑаÑÑ Ð¸Ñ
в лÑбое вÑемÑ, не говоÑÑ Ð¸Ð¼
об ÑÑом."
#~ msgid ""
-#~ "<small>Please note that the article wrongly refers to crackers as “"
-#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
-#~ "small>"
-#~ msgstr ""
-#~ "<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
-#~ "обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
-
-#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.tr.po 11 Jul 2021 06:11:34 -0000 1.180
+++ proprietary.tr.po 15 Jul 2021 06:32:49 -0000 1.181
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-11 08:10+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -98,9 +99,14 @@
"Modern özel mülk yazılımın genellikle sahip olduÄu bir yoldur."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Haziran 2021 itibarıyla bu dizindeki sayfalar (destekleyen 600'den fazla "
@@ -336,6 +342,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırmaktır.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -410,36 +450,6 @@
"çerezler de var. Bu uygulamaların bazıları kullanıcıları farklı
platformlar "
"boyunca takip ediyor."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok uygulamaları, kullanıcıların akıllı
telefonlarından "
-"biyometrik kimlik ve biyometrik bilgi topluyor</a>. Arkasındaki Åirket ne "
-"isterse onu yapıyor, toplayabildiÄi veriyi topluyor."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"Google, Apple, ve Microsoft (ve muhtemelen baÅka Åirketler de) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">insanların "
-"eriÅim noktası ve GPS koordinatlarını (bu bilgiler insanların kesin
konumunu "
-"tanımlayabilir), GPS'leri kapalı olsa bile</a>, kiÅilerin rızası
olmadan, "
-"insanların akıllı telefonundaki özel mülk yazılımları kullanarak
topluyor. "
-"Gerçi salt izin istemek de bu durumu meÅrulatırmaz."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -521,6 +531,35 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok uygulamaları, kullanıcıların akıllı "
+#~ "telefonlarından biyometrik kimlik ve biyometrik bilgi topluyor</a>. "
+#~ "Arkasındaki Åirket ne isterse onu yapıyor, toplayabildiÄi veriyi
topluyor."
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "Google, Apple, ve Microsoft (ve muhtemelen baÅka Åirketler de) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">insanların "
+#~ "eriÅim noktası ve GPS koordinatlarını (bu bilgiler insanların kesin "
+#~ "konumunu tanımlayabilir), GPS'leri kapalı olsa bile</a>, kiÅilerin
rızası "
+#~ "olmadan, insanların akıllı telefonundaki özel mülk yazılımları
kullanarak "
+#~ "topluyor. Gerçi salt izin istemek de bu durumu meÅrulatırmaz."
+
+#~ msgid ""
#~ "<a href=\"https://www.theverge.com/2018/8/13/17684660/google-turn-off-"
#~ "location-history-data\">Google will track people even if people turn off "
#~ "location history</a>, using Google Maps, weather updates, and browser "
@@ -766,15 +805,6 @@
#~ "democracy.html\">halka yönelik bir haksızlıktır</a> ."
#~ msgid ""
-#~ "<small>Please note that the article wrongly refers to crackers as “"
-#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
-#~ "small>"
-#~ msgstr ""
-#~ "<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
-#~ "philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-#~ "adlandırmaktır.</small>"
-
-#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.zh-cn.po 6 Jul 2021 09:33:36 -0000 1.229
+++ proprietary.zh-cn.po 15 Jul 2021 06:32:49 -0000 1.230
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2021-07-06 17:00+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-15 06:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -91,9 +92,14 @@
"çåå¨ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"æªè³ 2021 å¹´ 6 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 600 å¤ä»½è¯"
@@ -315,6 +321,39 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -379,34 +418,6 @@
"æ¶éç¨æ·æ°æ®</a>ï¼å
¶ä¸å
æ¬ææçå¥åº·ä¿¡æ¯ãè·è¸ªæ
è¯ä»¥åè·è¸ªç¨æ·ç cookie ç¨åº"
"çãå
¶ä¸ä¸äºåºç¨è¿ä¼è·¨å¹³å°è·è¸ªç¨æ·ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok
åºç¨ä»ææºææºç¨æ·ççç©è¯å«ä¿¡æ¯åçç©èº«ä»½ä¿¡æ¯</a>ï¼è"
-"å
¶èåçå
¬å¸ä¼æ¶é并å¤çä»»ä½å¯è·åçæ°æ®ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-"è°·æãè¹æå微软ï¼å¯è½è¿æå
¶ä»ä¸äºå
¬å¸ï¼å¨ä¸ªäººä¸ç¥æ
çæ
åµä¸ï¼ä½¿ç¨å®è£
å¨ä¸ªäºº"
-"ææºä¸çä¸æ软件 <a href=\"https://www.lifewire.com/wifi-positioning-"
-"system-1683343\">æ¶é人们çç½ç»è®¿é®å°ç¹å GPS åæ
ï¼å¯ç¨äºç¡®å®äººä»¬ç精确ä½"
-"ç½®ï¼ï¼å³ä½¿äººä»¬å
³é GPS æå¡ä¹æ¯ä¸æ ·</a>ãç¶èä»
ä»
æ¯å¾å¾äººä»¬ç许å¯å¹¶ä¸è½ä½¿è¿ç§"
-"è¡ä¸ºåæ³ã"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -482,6 +493,33 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok apps collect biometric identifiers and "
+#~ "biometric information from users' smartphones</a>. The company behind it "
+#~ "does whatever it wants and collects whatever data it can."
+#~ msgstr ""
+#~ "<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
+#~ "permission-to-collect-biometric-data-on-u-s-users-including-faceprints-"
+#~ "and-voiceprints/\">TikTok
åºç¨ä»ææºææºç¨æ·ççç©è¯å«ä¿¡æ¯åçç©èº«ä»½ä¿¡æ¯</"
+#~ "a>ï¼èå
¶èåçå
¬å¸ä¼æ¶é并å¤çä»»ä½å¯è·åçæ°æ®ã"
+
+#~ msgid ""
+#~ "Google, Apple, and Microsoft (and probably some other companies) <a href="
+#~ "\"https://www.lifewire.com/wifi-positioning-system-1683343\">are "
+#~ "collecting people's access points and GPS coordinates (which can identify "
+#~ "people's precise location) even if their GPS is turned off</a>, without "
+#~ "the person's consent, using proprietary software implemented in person's "
+#~ "smartphone. Though merely asking for permission would not necessarily "
+#~ "legitimize this."
+#~ msgstr ""
+#~ "è°·æãè¹æå微软ï¼å¯è½è¿æå
¶ä»ä¸äºå
¬å¸ï¼å¨ä¸ªäººä¸ç¥æ
çæ
åµä¸ï¼ä½¿ç¨å®è£
å¨ä¸ª"
+#~ "人ææºä¸çä¸æ软件 <a
href=\"https://www.lifewire.com/wifi-positioning-"
+#~ "system-1683343\">æ¶é人们çç½ç»è®¿é®å°ç¹å GPS åæ
ï¼å¯ç¨äºç¡®å®äººä»¬ç精确ä½"
+#~ "ç½®ï¼ï¼å³ä½¿äººä»¬å
³é GPS æå¡ä¹æ¯ä¸æ ·</a>ãç¶èä»
ä»
æ¯å¾å¾äººä»¬ç许å¯å¹¶ä¸è½ä½¿"
+#~ "è¿ç§è¡ä¸ºåæ³ã"
+
+#~ msgid ""
#~ "<a href=\"https://www.theverge.com/2018/8/13/17684660/google-turn-off-"
#~ "location-history-data\">Google will track people even if people turn off "
#~ "location history</a>, using Google Maps, weather updates, and browser "
@@ -720,14 +758,6 @@
#~ "surveillance-vs-democracy.html\">对å
¬ä¼æ¯ä¸å
¬æ£ç</a>ã"
#~ msgid ""
-#~ "<small>Please note that the article wrongly refers to crackers as “"
-#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
-#~ "small>"
-#~ msgstr ""
-#~ "<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
-
-#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary.zh-tw-diff.html 4 Jul 2021 05:31:23 -0000 1.274
+++ proprietary.zh-tw-diff.html 15 Jul 2021 06:32:49 -0000 1.275
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,14 +65,14 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>July,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 610 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -140,15 +140,15 @@
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -224,6 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202107090">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and
install programs, view and delete data, or even create new user accounts with
full user rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait
+ for Microsoft to fix the flaw, if they fix it.</p>
+
+ <p><small>Please note that the article
+ wrongly refers to crackers as “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
+ </li>
+
+ <li id="M202107050">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">Advertising
+ companies are experimenting to manipulate people's minds</a> and
impose a new way of advertising by altering their dreams. This “targeted
dream incubation” would trigger “refreshing dreams” of the
product, according to the companies.</p>
+ </li>
+
<li id="M202106220">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -268,28 +289,6 @@
track user activities. Some of these applications are tracking users
across different platforms.</p>
</li>
-
- <li id="M202106030">
- <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
- users' smartphones</a>. The company behind it does whatever it wants
- and collects whatever data it can.</p>
- </li>
-
- <li id="M202004131">
- <!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google, Apple, and Microsoft (and probably some other companies)
- <a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates (which can
- identify people's precise location) even if their GPS is turned
- off</a>, without the person's consent, using proprietary software
- implemented in person's smartphone. Though merely asking for permission
- would not necessarily legitimize this.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -353,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/04 05:31:23 $
+$Date: 2021/07/15 06:32:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.zh-tw.po 4 Jul 2021 05:31:23 -0000 1.263
+++ proprietary.zh-tw.po 15 Jul 2021 06:32:49 -0000 1.264
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-04 05:25+0000\n"
+"POT-Creation-Date: 2021-07-15 06:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -97,9 +97,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -107,8 +107,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -458,6 +458,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -505,25 +536,6 @@
"applications are tracking users across different platforms."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-"
-"permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-"
-"voiceprints/\">TikTok apps collect biometric identifiers and biometric "
-"information from users' smartphones</a>. The company behind it does whatever "
-"it wants and collects whatever data it can."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Google, Apple, and Microsoft (and probably some other companies) <a href="
-"\"https://www.lifewire.com/wifi-positioning-system-1683343\">are collecting "
-"people's access points and GPS coordinates (which can identify people's "
-"precise location) even if their GPS is turned off</a>, without the person's "
-"consent, using proprietary software implemented in person's smartphone. "
-"Though merely asking for permission would not necessarily legitimize this."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- pt-br.po 11 Jul 2021 23:04:54 -0000 1.405
+++ pt-br.po 15 Jul 2021 06:32:49 -0000 1.406
@@ -176,8 +176,8 @@
msgid ""
"<small>(Note that the article refers to the infected software as “"
"content management system”. A better term would be “<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>”.)"
+"</small>"
msgstr ""
"<small>(Note que o artigo se refere ao software infectado como âsistema de "
"gestão de conteúdoâ. Um termo melhor seria â<a
href=\"/philosophy/words-to-"
@@ -508,6 +508,40 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -873,15 +907,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -5519,8 +5544,8 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"O <a href=\"https://docs.microsoft.com/pt-br/windows/privacy/configure-"
@@ -7716,8 +7741,8 @@
#. type: Content of: <div><div><p>
msgid ""
"<small>(Unfortunately, the last two articles use “free” to mean "
-"“zero price.” We recommend saying “gratis” "
-"instead.)</small>"
+"“zero price.” We recommend saying “gratis” instead.)"
+"</small>"
msgstr ""
"<small>(Infelizmente, os últimos dois artigos usam <i
lang=\"en\">âfreeâ</i> "
"no sentido de âpreço zeroâ. Nós recomendamos dizer
âgrátisâ.)</small>"
@@ -9168,8 +9193,8 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Note que este artigo usa indevidamente as palavras â<a href=\"/"
"philosophy/free-sw.html\"><i lang=\"en\">free software</i></a>â
referindo-se "
@@ -11831,14 +11856,19 @@
"ser mal."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Até junho de 2021, as páginas neste diretório listam cerca de 500 exemplos
"
-"de funcionalidades maliciosas (com mais de 600 referências para confirmá-"
-"las), mas com certeza há mais milhares das quais nós não temos
conhecimento."
+"Até junho de 2021, as páginas neste diretório listam quase 500 exemplos de
"
+"funcionalidades maliciosas (com mais de 600 referências para confirmá-las),
"
+"mas com certeza há mais milhares das quais nós não temos conhecimento."
#. type: Content of: <div><p>
msgid ""
@@ -13217,6 +13247,16 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até junho de 2021, as páginas neste diretório listam cerca de 500 "
+#~ "exemplos de funcionalidades maliciosas (com mais de 600 referências para "
+#~ "confirmá-las), mas com certeza há mais milhares das quais nós não
temos "
+#~ "conhecimento."
+
+#~ msgid ""
#~ "Google Chrome includes a module that <a href=\"https://www."
#~ "privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-"
#~ "room-shows-the-importance-of-privacy-defense-in-depth/\"> activates "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.684
retrieving revision 1.685
diff -u -b -r1.684 -r1.685
--- ru.po 5 Jul 2021 09:34:07 -0000 1.684
+++ ru.po 15 Jul 2021 06:32:50 -0000 1.685
@@ -509,17 +509,51 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
"people's treadmills by a software update</a>. The company now asks people "
"for a membership/subscription for what people already paid for."
msgstr ""
-"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Peloton, пÑоизводÑÑÐ°Ñ Ð±ÐµÐ³Ð¾Ð²Ñе
доÑожки, недавно <a href=\"https://www."
-"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
-"monthly-subscription-after-recall/\">оÑклÑÑило лÑдÑм
оÑновнÑе ÑÑнкÑии "
-"иÑ
беговÑÑ
доÑожек, обновив пÑогÑаммÑ</a>.
ТепеÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿ÑоÑиÑ, ÑÑÐ¾Ð±Ñ Ð»Ñди "
-"подпиÑÑвалиÑÑ Ð½Ð° Ñо, за ÑÑо они Ñже
заплаÑили."
+"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Peloton, пÑоизводÑÑÐ°Ñ Ð±ÐµÐ³Ð¾Ð²Ñе
доÑожки, недавно <a href=\"https://"
+"www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-"
+"into-monthly-subscription-after-recall/\">оÑклÑÑило лÑдÑм
оÑновнÑе ÑÑнкÑии "
+"иÑ
беговÑÑ
доÑожек, обновив пÑогÑаммÑ</a>.
ТепеÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿ÑоÑиÑ, ÑÑÐ¾Ð±Ñ "
+"лÑди подпиÑÑвалиÑÑ Ð½Ð° Ñо, за ÑÑо они Ñже
заплаÑили."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -528,9 +562,9 @@
"talks to external networks, you must expect it to take in new malware."
msgstr ""
"ÐÑогÑаммÑ, пÑименÑемÑе в беговой доÑожке,
неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸, веÑоÑÑно, в ниÑ
еÑÑÑ "
-"ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¿ÑинÑдиÑелÑного
Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм. ÐÑо Ð´Ð°ÐµÑ ÑÑок: еÑли
пÑодÑÐºÑ "
-"обÑаеÑÑÑ Ñ Ð²Ð½ÐµÑними ÑеÑÑми, нÑжно ожидаÑÑ,
ÑÑо он пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ Ð² ÑÐµÐ±Ñ Ð½Ð¾Ð²Ñе "
-"вÑедоноÑнÑе пÑогÑаммÑ."
+"ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¿ÑинÑдиÑелÑного
Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм. ÐÑо Ð´Ð°ÐµÑ ÑÑок: еÑли "
+"пÑодÑÐºÑ Ð¾Ð±ÑаеÑÑÑ Ñ Ð²Ð½ÐµÑними ÑеÑÑми, нÑжно
ожидаÑÑ, ÑÑо он пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ Ð² ÑÐµÐ±Ñ "
+"новÑе вÑедоноÑнÑе пÑогÑаммÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -539,8 +573,8 @@
"locked feature."
msgstr ""
"ÐбÑаÑиÑе внимание, ÑÑо компаниÑ,
пÑоизводÑÑÐ°Ñ ÑÑÐ¾Ñ Ð¿ÑодÑкÑ, заÑвлÑла, ÑÑо "
-"они ÑабоÑаÑÑ Ð½Ð°Ð´ Ñем, ÑÑÐ¾Ð±Ñ Ð¾ÑмениÑÑ
изменениÑ, ÑÑÐ¾Ð±Ñ Ð»ÑдÑм болÑÑе не "
-"нÑжно бÑло подпиÑÑваÑÑÑÑ Ð´Ð»Ñ Ñого, ÑÑобÑ
полÑзоваÑÑÑÑ Ð¾ÑклÑÑенной ÑÑнкÑией."
+"они ÑабоÑаÑÑ Ð½Ð°Ð´ Ñем, ÑÑÐ¾Ð±Ñ Ð¾ÑмениÑÑ
изменениÑ, ÑÑÐ¾Ð±Ñ Ð»ÑдÑм болÑÑе не нÑжно "
+"бÑло подпиÑÑваÑÑÑÑ Ð´Ð»Ñ Ñого, ÑÑобÑ
полÑзоваÑÑÑÑ Ð¾ÑклÑÑенной ÑÑнкÑией."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -549,10 +583,10 @@
"the proprietary software that is their entry path) to the point that even "
"the most powerful companies don't dare."
msgstr ""
-"ÐÑевидно, взÑÑв обÑеÑÑвенного возмÑÑениÑ
заÑÑавил ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð¹Ñи на попÑÑнÑй. "
-"ÐÑли Ð¼Ñ Ñ
оÑим полагаÑÑÑÑ Ð½Ð° ÑÑо, нÑжно
поднÑÑÑ Ð²Ð¾Ð·Ð¼ÑÑение пÑоÑив вÑедоноÑнÑÑ
"
-"ÑÑнкÑий (и неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе
вводÑÑ Ð¸Ñ
) до Ñакой ÑÑепени, ÑÑÐ¾Ð±Ñ "
-"даже ÑамÑе могÑÑеÑÑвеннÑе компании не
Ñмели ÑÑого делаÑÑ."
+"ÐÑевидно, взÑÑв обÑеÑÑвенного возмÑÑениÑ
заÑÑавил ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð¹Ñи на "
+"попÑÑнÑй. ÐÑли Ð¼Ñ Ñ
оÑим полагаÑÑÑÑ Ð½Ð° ÑÑо,
нÑжно поднÑÑÑ Ð²Ð¾Ð·Ð¼ÑÑение пÑоÑив "
+"вÑедоноÑнÑÑ
ÑÑнкÑий (и неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе вводÑÑ Ð¸Ñ
) до Ñакой "
+"ÑÑепени, ÑÑÐ¾Ð±Ñ Ð´Ð°Ð¶Ðµ ÑамÑе могÑÑеÑÑвеннÑе
компании не Ñмели ÑÑого делаÑÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -875,15 +909,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -11984,9 +12009,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-June,-] {+July,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than 6[-0-]{+1+}0
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Ðа иÑÐ½Ñ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
@@ -13388,6 +13422,15 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ðа иÑÐ½Ñ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
+#~ "пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более 600
ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), но "
+#~ "еÑÑÑ, беÑÑпоÑно, ÑÑÑÑÑи дÑÑгиÑ
, о коÑоÑÑÑ
Ð¼Ñ Ð½Ðµ знаем."
+
+#~ msgid ""
#~ "Google Chrome includes a module that <a href=\"https://www."
#~ "privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-"
#~ "room-shows-the-importance-of-privacy-defense-in-depth/\"> activates "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- tr.po 11 Jul 2021 06:29:35 -0000 1.201
+++ tr.po 15 Jul 2021 06:32:50 -0000 1.202
@@ -414,6 +414,44 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Bu yazının güvenlik kırıcılarını yanlıŠbir Åekilde \"<a
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırdıÄını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -819,19 +857,6 @@
"yönelik bir haksızlıktır</a> ."
#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Bu yazının güvenlik kırıcılarını yanlıŠbir Åekilde \"<a
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırdıÄını belirtmek isteriz)</small>"
-
-#. type: Content of: <div><ul><li><p>
msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
@@ -9217,15 +9242,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of March, 2021, the pages in this directory list around 500 instances "
-#| "of malicious functionalities (with more than 590 references to back them "
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Mart 2021 itibarıyla bu dizindeki sayfalar (destekleyen 590'dan fazla "
+"Haziran 2021 itibarıyla bu dizindeki sayfalar (destekleyen 600'den fazla "
"referansla birlikte) yaklaÅık 500 kötücül iÅlevsellik örneÄini
listeliyor, "
"ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
@@ -10370,6 +10395,20 @@
#, fuzzy
#~| msgid ""
+#~| "As of March, 2021, the pages in this directory list around 500 instances "
+#~| "of malicious functionalities (with more than 590 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Mart 2021 itibarıyla bu dizindeki sayfalar (destekleyen 590'dan fazla "
+#~ "referansla birlikte) yaklaÅık 500 kötücül iÅlevsellik örneÄini "
+#~ "listeliyor, ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
+
+#, fuzzy
+#~| msgid ""
#~| "As of February, 2021, the pages in this directory list around 500 "
#~| "instances of malicious functionalities (with more than 580 references to "
#~| "back them up), but there are surely thousands more we don't know about."
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- zh-cn.po 6 Jul 2021 09:33:36 -0000 1.202
+++ zh-cn.po 15 Jul 2021 06:32:50 -0000 1.203
@@ -414,6 +414,43 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">é»å®¢</a> ä¸è¯å½æéªå®¢æ¥ç¨ãï¼</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -779,18 +816,6 @@
"surveillance-vs-democracy.html\">对å
¬ä¼æ¯ä¸å
¬æ£ç</a>ã"
#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">é»å®¢</a> ä¸è¯å½æéªå®¢æ¥ç¨ãï¼</small>"
-
-#. type: Content of: <div><ul><li><p>
msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
@@ -8871,15 +8896,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of March, 2021, the pages in this directory list around 500 instances "
-#| "of malicious functionalities (with more than 590 references to back them "
+#| "As of June, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 600 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"æªè³ 2021 å¹´ 3 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 590 å¤ä»½è¯"
+"æªè³ 2021 å¹´ 6 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 600 å¤ä»½è¯"
"æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
#. type: Content of: <div><p>
@@ -10068,6 +10093,19 @@
#, fuzzy
#~| msgid ""
+#~| "As of March, 2021, the pages in this directory list around 500 instances "
+#~| "of malicious functionalities (with more than 590 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "æªè³ 2021 å¹´ 3 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 590 å¤"
+#~ "份è¯æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
+
+#, fuzzy
+#~| msgid ""
#~| "As of February, 2021, the pages in this directory list around 500 "
#~| "instances of malicious functionalities (with more than 580 references to "
#~| "back them up), but there are surely thousands more we don't know about."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- zh-tw.po 4 Jul 2021 05:31:23 -0000 1.326
+++ zh-tw.po 15 Jul 2021 06:32:50 -0000 1.327
@@ -439,6 +439,37 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
+"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">can allow "
+"crackers to remotely gain access to the operating system</a> and install "
+"programs, view and delete data, or even create new user accounts with full "
+"user rights."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The security research firm accidentally leaked instructions on how the flaw "
+"could be exploited but Windows users should still wait for Microsoft to fix "
+"the flaw, if they fix it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
+"dream-incubation\">Advertising companies are experimenting to manipulate "
+"people's minds</a> and impose a new way of advertising by altering their "
+"dreams. This “targeted dream incubation” would trigger “"
+"refreshing dreams” of the product, according to the companies."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Peloton company which produces treadmills recently <a href=\"https://www."
"bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
"monthly-subscription-after-recall/\">locked people out of basic features of "
@@ -673,12 +704,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"TV manufacturers are turning to produce only “Smart” TV sets "
"(which include spyware) that <a href=\"https://frame.work/blog/in-defense-of-"
"dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
@@ -8458,9 +8483,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+July, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 600 references to
+# | [-functionalities,-] {+functionalities (with more than 610 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -8468,8 +8493,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of June, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 600 references to back them up), "
+"As of July, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 610 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -9916,6 +9941,19 @@
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
#~ msgid ""
+#~ "As of June, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 600 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°"
+#~ "éæä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
#~ "As of March, 2021, the pages in this directory list around 500 instances "
#~ "of malicious functionalities (with more than 590 references to back them "
#~ "up), but there are surely thousands more we don't know about."
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/04
- www/proprietary/po all.fr.po all.pot all.pt-br....,
GNUN <=
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/15
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/25
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/30
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/31
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/31