www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/all.fr.html proprietary/malware...


From: GNUN
Subject: www proprietary/all.fr.html proprietary/malware...
Date: Thu, 15 Jul 2021 05:33:33 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/15 05:33:33

Modified files:
        proprietary    : all.fr.html malware-microsoft.fr.html 
                         potential-malware.fr.html 
                         proprietary-insecurity.fr.html 
                         proprietary-manipulation.fr.html 
                         proprietary.fr.html 
        proprietary/po : all.fr-en.html malware-microsoft.fr-en.html 
                         potential-malware.fr-en.html 
                         proprietary-censorship.fr-en.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary-manipulation.fr-en.html 
                         proprietary.fr-en.html 
        server         : body-include-1.fr.html 
        server/po      : body-include-1.fr.po sitemap.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.fr.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-1.fr.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-1.fr.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.329&r2=1.330

Patches:
Index: proprietary/all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/all.fr.html     4 Jul 2021 19:29:43 -0000       1.17
+++ proprietary/all.fr.html     15 Jul 2021 09:33:32 -0000      1.18
@@ -47,6 +47,40 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' -->
+<!--#set var='PUB' value='2021-07-09' -->
+<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
+ &ndash; Dernière référence : <!--#echo encoding='none' var='PUB' -->
+</small>
+    <p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+    <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige – si jamais ils la
+corrigent.</p>
+
+    <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+  </li>
+
+<!--#set var='ADD' value='2021-07-15' -->
+<!--#set var='PUB' value='2021-07-05' -->
+<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
+ &ndash; Dernière référence : <!--#echo encoding='none' var='PUB' -->
+</small>
+    <p>Des publicitaires sont en train d'expérimenter une technique de 
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+  </li>
+
 <!--#set var='ADD' value='2021-07-04' -->
 <!--#set var='PUB' value='2021-06-22' -->
 <li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
@@ -3101,7 +3135,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/07/04 19:29:43 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary/malware-microsoft.fr.html       13 Jun 2021 11:59:14 -0000      
1.117
+++ proprietary/malware-microsoft.fr.html       15 Jul 2021 09:33:32 -0000      
1.118
@@ -228,6 +228,28 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+    <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige – si jamais ils la
+corrigent.</p>
+
+    <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+  </li>
+
   <li id="M202103050">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1160,7 +1182,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/06/13 11:59:14 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/potential-malware.fr.html       1 Jun 2021 09:43:54 -0000       
1.24
+++ proprietary/potential-malware.fr.html       15 Jul 2021 09:33:32 -0000      
1.25
@@ -59,6 +59,20 @@
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
+  <li id="M202107050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de 
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+  </li>
+
   <li id="M201903280">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -234,7 +248,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/06/01 09:43:54 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/proprietary-insecurity.fr.html  30 Jun 2021 18:29:45 -0000      
1.131
+++ proprietary/proprietary-insecurity.fr.html  15 Jul 2021 09:33:32 -0000      
1.132
@@ -79,6 +79,28 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+    <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige – si jamais ils la
+corrigent.</p>
+
+    <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+  </li>
+
   <li id="M202106030">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1440,7 +1462,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/06/30 18:29:45 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-manipulation.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.fr.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary-manipulation.fr.html        4 Jul 2021 19:29:43 
-0000       1.22
+++ proprietary/proprietary-manipulation.fr.html        15 Jul 2021 09:33:32 
-0000      1.23
@@ -74,6 +74,20 @@
 <div class="column-limit" id="proprietary-manipulation"></div>
 
 <ul class="blurbs">
+  <li id="M202107050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de 
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+  </li>
+
   <li id="M202106220">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -285,7 +299,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/07/04 19:29:43 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary/proprietary.fr.html     4 Jul 2021 07:33:26 -0000       1.232
+++ proprietary/proprietary.fr.html     15 Jul 2021 09:33:32 -0000      1.233
@@ -102,9 +102,9 @@
 <hr class="thin" />
 </div>
 
-<p>En juin 2021, les pages de ce répertoire dénombraient à peu près 500 
cas de
-fonctionnalités malveillante (appuyés par plus de 600 références), mais il 
y
-en a sûrement des milliers d'autres dont nous ne savons rien.</p>
+<p>En juillet 2021, les pages de ce répertoire dénombraient à peu près 500 
cas
+de fonctionnalités malveillante (appuyés par plus de 610 références), mais
+il y en a sûrement des milliers d'autres dont nous ne savons rien.</p>
 
 <p>Si vous voulez être informé des nouvelles rubriques ou autres changements,
 abonnez-vous à la <a
@@ -197,6 +197,42 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Une vulnérabilité détectée récemment dans Microsoft Windows <a
+href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>permet
+à des pirates d'avoir accès au système d'exploitation</a> pour installer des
+programmes, voir et supprimer des données et même créer de nouveaux comptes
+utilisateurs avec tous les droits.</p>
+
+    <p>L'entreprise de recherche en sécurité a divulgué accidentellement des
+instructions sur la manière d'exploiter cette faille, mais les utilisateurs
+de Windows attendent toujours que Microsoft la corrige – si jamais ils la
+corrigent.</p>
+
+    <p><small>(Notez que cet article utilise le terme « <a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
+escient.)</small></p>
+  </li>
+
+  <li id="M202107050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Des publicitaires sont en train d'expérimenter une technique de 
manipulation
+mentale consistant à <a
+href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>altérer
+les rêves</a> pour promouvoir un produit. D'après eux, cette « incubation
+ciblée des rêves » est censée provoquer chez le sujet des « rêves de
+réactivation ».</p>
+  </li>
+
   <li id="M202106220">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -252,34 +288,6 @@
 activités. Certaines de ces applis traquent les utilisateurs sur différentes
 plateformes.</p>
   </li>
-
-  <li id="M202106030">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-06</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>L'appli
-TikTok pour smartphone collecte des informations et identifiants
-biométriques</a>. Son éditeur récupère tout ce qui est à sa portée et 
fait
-ce qu'il veut avec.</p>
-  </li>
-
-  <li id="M202004131">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2020-04</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Google, Apple et Microsoft (ainsi que d'autres, probablement) <a
-href="https://www.lifewire.com/wifi-positioning-system-1683343";>enregistrent
-les points d'accès wifi et les coordonnées GPS des gens</a>, ce qui permet
-de les localiser précisément même si le GPS est éteint, ceci sans leur
-consentement et en utilisant le logiciel privateur installé dans leur
-téléphone. Même si on leur demandait la permission, cela ne légitimerait 
pas
-nécessairement cette pratique.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">Voir plus&hellip;</a></p>
@@ -359,7 +367,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/07/04 07:33:26 $
+$Date: 2021/07/15 09:33:32 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/all.fr-en.html       4 Jul 2021 07:33:28 -0000       1.13
+++ proprietary/po/all.fr-en.html       15 Jul 2021 09:33:32 -0000      1.14
@@ -42,6 +42,32 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-05' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
 <!--#set var='ADD' value='2021-07-04' --><!--#set var='PUB' value='2021-06-22' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Peloton company which produces treadmills recently <a
     
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/";>locked
@@ -2289,7 +2315,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 07:33:28 $
+$Date: 2021/07/15 09:33:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-microsoft.fr-en.html 13 Jun 2021 11:59:15 -0000      
1.107
+++ proprietary/po/malware-microsoft.fr-en.html 15 Jul 2021 09:33:32 -0000      
1.108
@@ -200,6 +200,24 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202103050">
     <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -953,7 +971,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/13 11:59:15 $
+$Date: 2021/07/15 09:33:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/potential-malware.fr-en.html 1 Jun 2021 09:44:00 -0000       
1.22
+++ proprietary/po/potential-malware.fr-en.html 15 Jul 2021 09:33:32 -0000      
1.23
@@ -54,6 +54,18 @@
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M201903280">
     <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -193,7 +205,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/15 09:33:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-censorship.fr-en.html    1 Jun 2021 09:44:00 
-0000       1.37
+++ proprietary/po/proprietary-censorship.fr-en.html    15 Jul 2021 09:33:32 
-0000      1.38
@@ -50,7 +50,7 @@
 <p>One kind of malicious functionality is censorship of what
 users can access.  Here are examples of programs which do this.
 We have a <a
-href="/proprietary/proprietary-jails.html#about-page">separate
+href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;).</p>
 
@@ -212,7 +212,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/01 09:44:00 $
+$Date: 2021/07/15 09:33:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/proprietary-insecurity.fr-en.html    30 Jun 2021 18:29:45 
-0000      1.118
+++ proprietary/po/proprietary-insecurity.fr-en.html    15 Jul 2021 09:33:32 
-0000      1.119
@@ -71,6 +71,24 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202106030">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1140,7 +1158,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/30 18:29:45 $
+$Date: 2021/07/15 09:33:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-manipulation.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-manipulation.fr-en.html  4 Jul 2021 07:33:30 
-0000       1.18
+++ proprietary/po/proprietary-manipulation.fr-en.html  15 Jul 2021 09:33:33 
-0000      1.19
@@ -68,6 +68,18 @@
 <div class="column-limit" id="proprietary-manipulation"></div>
 
 <ul class="blurbs">
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M202106220">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -236,7 +248,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 07:33:30 $
+$Date: 2021/07/15 09:33:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary/po/proprietary.fr-en.html       4 Jul 2021 07:33:30 -0000       
1.217
+++ proprietary/po/proprietary.fr-en.html       15 Jul 2021 09:33:33 -0000      
1.218
@@ -96,8 +96,8 @@
 <hr class="thin" />
 </div>
 
-<p>As of June, 2021, the pages in this directory list around 500
-instances of malicious functionalities (with more than 600 references to
+<p>As of July, 2021, the pages in this directory list around 500
+instances of malicious functionalities (with more than 610 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
 <p>If you want to be notified when we add new items or make other changes,
@@ -186,6 +186,36 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202107090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
+
+    <p>The security research firm accidentally leaked instructions on
+    how the flaw could be exploited but Windows users should still wait
+    for Microsoft to fix the flaw, if they fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202107050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation";>
+    Advertising companies are experimenting to manipulate people's
+    minds</a>, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.</p>
+  </li>
+
   <li id="M202106220">
     <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -230,28 +260,6 @@
     track user activities. Some of these applications are tracking users
     across different platforms.</p>
   </li>
-
-  <li id="M202106030">
-    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>TikTok
-    apps collect biometric identifiers and biometric information from
-    users' smartphones</a>. The company behind it does whatever it wants
-    and collects whatever data it can.</p>
-  </li>
-
-  <li id="M202004131">
-    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>Google, Apple, and Microsoft (and probably some other companies)
-    <a href="https://www.lifewire.com/wifi-positioning-system-1683343";>are
-    collecting people's access points and GPS coordinates (which can
-    identify people's precise location) even if their GPS is turned
-    off</a>, without the person's consent, using proprietary software
-    implemented in person's smartphone. Though merely asking for permission
-    would not necessarily legitimize this.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -314,7 +322,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/04 07:33:30 $
+$Date: 2021/07/15 09:33:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/body-include-1.fr.html
===================================================================
RCS file: /web/www/www/server/body-include-1.fr.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- server/body-include-1.fr.html       15 Jul 2021 07:02:48 -0000      1.48
+++ server/body-include-1.fr.html       15 Jul 2021 09:33:33 -0000      1.49
@@ -13,10 +13,11 @@
   <div class="message">
     <p>
       <!--#echo encoding='none' var='fr_link' -->
-Your donation helps us lead the journey to freedom for all computer
-users. Help us maximize our summer fundraising goal by donating before July
-19 &mdash; Every contribution will be matched dollar for dollar by generous
-donors up to USD 11,000.  <span class="highlight">Read more &gt;</span>
+Votre don nous aide à conduire tous les utilisateurs de l'informatique vers
+la liberté. Aidez-nous à optimiser le résultat de notre appel de fonds en
+faisant un don avant le 19 juillet. Chaque contribution sera abondée de la
+même somme par de généreux donateurs jusqu'à 11 000 $. <span
+class="highlight">En savoir plus &gt;</span>
     <!--#echo
       encoding='none' var='a_close' -->
 </p>
@@ -50,7 +51,7 @@
 <!--#echo encoding="none" var="a_close" -->
 <!--#echo encoding='none' var="d_val" -->
 </div>
-      <span class="goal">USD 11,000</span>
+      <span class="goal">11 000 $</span>
     </div>
   </div>
 <!-- .progresswidget -->

Index: server/po/body-include-1.fr.po
===================================================================
RCS file: /web/www/www/server/po/body-include-1.fr.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- server/po/body-include-1.fr.po      15 Jul 2021 09:18:56 -0000      1.51
+++ server/po/body-include-1.fr.po      15 Jul 2021 09:33:33 -0000      1.52
@@ -34,8 +34,8 @@
 "Votre don nous aide à conduire tous les utilisateurs de l'informatique vers "
 "la liberté. Aidez-nous à optimiser le résultat de notre appel de fonds en "
 "faisant un don avant le 19 juillet. Chaque contribution sera abondée de la "
-"même somme par de généreux donateurs jusqu'à 11 000 $. <span 
class=\"highlight"
-"\">En savoir plus &gt;</span>"
+"même somme par de généreux donateurs jusqu'à 11 000 $. <span class="
+"\"highlight\">En savoir plus &gt;</span>"
 
 #. type: Content of: <div><div>
 msgid "<span class=\"goal\">USD 11,000</span>"

Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- server/po/sitemap.fr-en.html        12 Jul 2021 19:00:46 -0000      1.329
+++ server/po/sitemap.fr-en.html        15 Jul 2021 09:33:33 -0000      1.330
@@ -456,7 +456,7 @@
   <dt><a href="/fun/jokes/hap-bash.html">hap-bash.html</a></dt>
   <dd>Happiness is a Bash Prompt</dd>
   <dt><a href="/fun/jokes/happy-new-year.html">happy-new-year.html</a></dt>
-  <dd>Happy New Year in 4 languages</dd>
+  <dd>Happy New Year in four languages</dd>
   <dt><a 
href="/fun/jokes/hello_world_patent.html">hello_world_patent.html</a></dt>
   <dd>The YAAS Foundation Patent Suit</dd>
   <dt><a href="/fun/jokes/helloworld.html">helloworld.html</a></dt>
@@ -474,7 +474,7 @@
   <dt><a href="/fun/jokes/luser-vs-rms.html">luser-vs-rms.html</a></dt>
   <dd>Luser vs RMS</dd>
   <dt><a href="/fun/jokes/merry-xmas.html">merry-xmas.html</a></dt>
-  <dd>Merry Christmas in 4 languages</dd>
+  <dd>Merry Christmas in four languages</dd>
   <dt><a href="/fun/jokes/microsoft-church.html">microsoft-church.html</a></dt>
   <dd>Microsoft and the Church</dd>
   <dt><a href="/fun/jokes/midnight.dreary.html">midnight.dreary.html</a></dt>
@@ -530,7 +530,7 @@
   <dt><a href="/fun/jokes/users-lightbulb.html">users-lightbulb.html</a></dt>
   <dd>How many GNU/Linux users are needed to change a light bulb?</dd>
   <dt><a href="/fun/jokes/vaxorcist.html">vaxorcist.html</a></dt>
-  <dd>THE VAXORCIST</dd>
+  <dd>The VAXorcist</dd>
   <dt><a href="/fun/jokes/vi.song.html">vi.song.html</a></dt>
   <dd>Addicted to <code>vi</code></dd>
   <dt><a href="/fun/jokes/vim-songs.html">vim-songs.html</a></dt>
@@ -2090,7 +2090,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/12 19:00:46 $
+$Date: 2021/07/15 09:33:33 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]