www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po all.fr.po all.pot all.pt-br....


From: GNUN
Subject: www/proprietary/po all.fr.po all.pot all.pt-br....
Date: Sat, 31 Jul 2021 13:03:14 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/31 13:03:13

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.pt-br.po 
                         malware-apple.ru.po malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.pt-br.po malware-google.ru.po 
                         nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.475&r2=1.476
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.586&r2=1.587
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pt-br.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.331&r2=1.332
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.493&r2=1.494
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.520&r2=1.521
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.443&r2=1.444
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.539&r2=1.540
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.414&r2=1.415
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.696&r2=1.697
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.332&r2=1.333

Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- all.fr.po   31 Jul 2021 07:32:16 -0000      1.43
+++ all.fr.po   31 Jul 2021 17:03:10 -0000      1.44
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-30 18:41+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -79,12 +79,25 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -117,8 +130,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -133,8 +146,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "

Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- all.pot     31 Jul 2021 07:32:16 -0000      1.23
+++ all.pot     31 Jul 2021 17:03:10 -0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -76,10 +76,9 @@
 msgid ""
 "<a "
 
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -101,8 +100,7 @@
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- all.pt-br.po        31 Jul 2021 07:32:16 -0000      1.18
+++ all.pt-br.po        31 Jul 2021 17:03:10 -0000      1.19
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -80,12 +80,19 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -129,8 +136,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "

Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- all.ru.po   31 Jul 2021 08:31:02 -0000      1.42
+++ all.ru.po   31 Jul 2021 17:03:10 -0000      1.43
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -84,12 +85,25 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
@@ -119,13 +133,26 @@
 "взломщиков.</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "

Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- de.po       31 Jul 2021 07:32:16 -0000      1.332
+++ de.po       31 Jul 2021 17:03:10 -0000      1.333
@@ -663,10 +663,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -700,8 +700,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -13480,20 +13479,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -13507,14 +13500,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.475
retrieving revision 1.476
diff -u -b -r1.475 -r1.476
--- es.po       31 Jul 2021 07:32:17 -0000      1.475
+++ es.po       31 Jul 2021 17:03:10 -0000      1.476
@@ -617,10 +617,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -655,8 +655,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -14679,12 +14678,25 @@
 msgstr "Censura en el software privativo"
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Esta página ofrece una lista de casos comprobados de inseguridad en el "
 "software privativo con graves consecuencias o dignos de mención. Aun cuando "
@@ -14695,15 +14707,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -14717,26 +14723,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-# || No change detected.  The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todo programa complejo, sea libre o privativo, contiene fallos. Lo que hace "
-"que los fallos sean más peligrosos en el software privativo es que los "
-"usuarios se ven <em>imposibilitados para subsanar cualquier problema de "
-"seguridad que surja</em>. El software privativo es culpable de mantener a "
-"los usuarios en la indefensión."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "
@@ -16013,6 +15999,38 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Esta página ofrece una lista de casos comprobados de inseguridad en el "
+#~ "software privativo con graves consecuencias o dignos de mención. Aun "
+#~ "cuando la mayor parte de estos fallos de seguridad no son intencionados, "
+#~ "de modo que en sentido estricto no son funcionalidades maliciosas, los "
+#~ "mencionamos aquí para mostrar que el software privativo no es inmune a "
+#~ "los fallos, y a menudo es bastante chapucero."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todo programa complejo, sea libre o privativo, contiene fallos. Lo que "
+#~ "hace que los fallos sean más peligrosos en el software privativo es que "
+#~ "los usuarios se ven <em>imposibilitados para subsanar cualquier problema "
+#~ "de seguridad que surja</em>. El software privativo es culpable de "
+#~ "mantener a los usuarios en la indefensión."
+
 #, fuzzy
 #~ msgid ""
 #~ "All complex programs, whether free or proprietary, contain bugs. What "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.586
retrieving revision 1.587
diff -u -b -r1.586 -r1.587
--- fr.po       31 Jul 2021 07:32:17 -0000      1.586
+++ fr.po       31 Jul 2021 17:03:10 -0000      1.587
@@ -501,12 +501,25 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -539,8 +552,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -555,8 +568,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
@@ -12421,12 +12433,25 @@
 msgstr "Insécurité du logiciel privateur"
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Cette page répertorie des failles de sécurité de logiciels privateurs, "
 "failles clairement établies qui ont de graves conséquences ou méritent "
@@ -12438,15 +12463,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -12460,27 +12479,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-# || No change detected.  The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Tous les programmes complexes, qu'ils soient libres ou privateurs, "
-"contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans le "
-"logiciel privateur est que <em>les utilisateurs n'ont pas la possibilité de "
-"corriger eux-mêmes les problèmes de sécurité qui pourraient 
survenir</em>.  "
-"C'est le fait de priver les utilisateurs de cette possibilité qui est "
-"coupable dans le logiciel privateur."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "
@@ -13607,6 +13605,78 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille "
+#~ "<i>zero-day</i> des iTrucs pour installer un logiciel espion</a>, sans "
+#~ "aucune action des utilisateurs (dont beaucoup étaient des journalistes), "
+#~ "et ceci même quand leur système d'exploitation était parfaitement à 
jour."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise "
+#~ "des vulnérabilités des systèmes d'exploitation privateurs pour "
+#~ "smartphones</a> pour espionner les gens. Il peut enregistrer les appels, "
+#~ "copier les messages et filmer les gens secrètement, sans aucune "
+#~ "interaction de leur part, en utilisant une vulnérabilité <i>zero-day</i> 
"
+#~ "(ce qui veut dire qu'elle n'a pas encore été divulguée)."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Cette page répertorie des failles de sécurité de logiciels privateurs, "
+#~ "failles clairement établies qui ont de graves conséquences ou méritent "
+#~ "d'être mentionnées pour d'autres raisons. Bien que la plupart de ces "
+#~ "failles soient involontaires, et donc ne constituent pas à proprement "
+#~ "parler des fonctionnalités malveillantes, nous les signalons pour montrer 
"
+#~ "que le logiciel privateur n'est pas exempt de bogues et qu'il est souvent "
+#~ "tout à fait bâclé."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Tous les programmes complexes, qu'ils soient libres ou privateurs, "
+#~ "contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans "
+#~ "le logiciel privateur est que <em>les utilisateurs n'ont pas la "
+#~ "possibilité de corriger eux-mêmes les problèmes de sécurité qui "
+#~ "pourraient survenir</em>.  C'est le fait de priver les utilisateurs de "
+#~ "cette possibilité qui est coupable dans le logiciel privateur."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- it.po       31 Jul 2021 07:32:17 -0000      1.332
+++ it.po       31 Jul 2021 17:03:10 -0000      1.333
@@ -629,10 +629,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -654,8 +654,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -12602,20 +12601,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -12629,14 +12622,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- ja.po       31 Jul 2021 07:32:17 -0000      1.340
+++ ja.po       31 Jul 2021 17:03:11 -0000      1.341
@@ -472,10 +472,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -497,8 +497,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -10253,20 +10252,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -10280,14 +10273,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- malware-apple.de-diff.html  31 Jul 2021 07:32:17 -0000      1.78
+++ malware-apple.de-diff.html  31 Jul 2021 17:03:11 -0000      1.79
@@ -312,7 +312,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -335,7 +335,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -485,9 +485,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-    iOS, the operating system of the Apple iThings, is the 
prototype</em></ins></span>
-    of <span class="inserted"><ins><em>a jail&lt;/a&gt;.  It was Apple that 
introduced the practice of
-    designing general purpose computers with censorship of application
+    iOS, the operating system of the Apple iThings, is the prototype
+    of a jail&lt;/a&gt;.  It was Apple that introduced the 
practice</em></ins></span> of
+    <span class="inserted"><ins><em>designing general purpose computers with 
censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
@@ -1321,8 +1321,8 @@
 
 &lt;p&gt;Curiously,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the
-<span class="removed"><del><strong>walls of the iThing jail: users can now 
install apps built from
+    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
+walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="removed"><del><strong>iThing jail: users can now install apps built from
 source code, provided</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>source code is written in Swift.  Users
 cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
@@ -1561,7 +1561,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- malware-apple.de.po 31 Jul 2021 07:32:17 -0000      1.169
+++ malware-apple.de.po 31 Jul 2021 17:03:11 -0000      1.170
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -536,10 +536,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -573,8 +573,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- malware-apple.es.po 31 Jul 2021 07:32:17 -0000      1.218
+++ malware-apple.es.po 31 Jul 2021 17:03:11 -0000      1.219
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -412,10 +412,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -450,8 +450,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- malware-apple.fr.po 31 Jul 2021 07:32:17 -0000      1.222
+++ malware-apple.fr.po 31 Jul 2021 17:03:11 -0000      1.223
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-30 18:41+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -407,12 +407,25 @@
 "que les logiciels privateurs prestigieux n'ont pas de bogue grave."
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -445,8 +458,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -461,8 +474,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-apple.it-diff.html  31 Jul 2021 07:32:17 -0000      1.83
+++ malware-apple.it-diff.html  31 Jul 2021 17:03:11 -0000      1.84
@@ -310,7 +310,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -333,7 +333,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -357,8 +357,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple</em></ins></span> has <span class="inserted"><ins><em>&lt;a
-    
href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented</em></ins></span>
-    a <span class="inserted"><ins><em>malware in its computers that imposes 
surveillance&lt;/a&gt; on users
+    
href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented
+    a malware in its computers that imposes surveillance&lt;/a&gt; on users
     and reports users' computing to Apple.&lt;/p&gt;
 
     &lt;p&gt;The reports are even unencrypted and they've been leaking this
@@ -387,8 +387,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
-    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+    malicious code from any application which uses this API to 
render</em></ins></span> a
+    <span class="inserted"><ins><em>certain kind of image 
file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604120"&gt;
@@ -1499,7 +1499,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- malware-apple.it.po 31 Jul 2021 07:32:17 -0000      1.162
+++ malware-apple.it.po 31 Jul 2021 17:03:11 -0000      1.163
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,10 +486,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -511,8 +511,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- malware-apple.ja-diff.html  31 Jul 2021 07:32:17 -0000      1.98
+++ malware-apple.ja-diff.html  31 Jul 2021 17:03:11 -0000      1.99
@@ -126,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -344,7 +344,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
+    used an exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
 After</strong></del></span> <span class="inserted"><ins><em>iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>latest version of the proprietary operating
@@ -368,7 +368,7 @@
     The pegasus spyware used vulnerabilities</em></ins></span> on <span 
class="inserted"><ins><em>proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to 
fix</em></ins></span> the <span class="removed"><del><strong>subject 
matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
@@ -731,12 +731,12 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
@@ -749,12 +749,12 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
@@ -1021,8 +1021,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
@@ -1061,8 +1061,8 @@
   &lt;li id="M201809070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1464,7 +1464,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-apple.ja.po 31 Jul 2021 07:32:17 -0000      1.145
+++ malware-apple.ja.po 31 Jul 2021 17:03:11 -0000      1.146
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -406,10 +406,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -431,8 +431,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-apple.nl-diff.html  31 Jul 2021 07:32:18 -0000      1.101
+++ malware-apple.nl-diff.html  31 Jul 2021 17:03:11 -0000      1.102
@@ -126,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -344,7 +344,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
+    used an exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
 After</strong></del></span> <span class="inserted"><ins><em>iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>latest version of the proprietary operating
@@ -368,7 +368,7 @@
     The pegasus spyware used vulnerabilities</em></ins></span> on <span 
class="inserted"><ins><em>proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to 
fix</em></ins></span> the <span class="removed"><del><strong>subject 
matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
@@ -731,12 +731,12 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
@@ -749,12 +749,12 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
@@ -1021,8 +1021,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
@@ -1061,8 +1061,8 @@
   &lt;li id="M201809070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1464,7 +1464,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-apple.nl.po 31 Jul 2021 07:32:18 -0000      1.99
+++ malware-apple.nl.po 31 Jul 2021 17:03:11 -0000      1.100
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -424,10 +424,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -449,8 +449,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-apple.pot   31 Jul 2021 07:32:18 -0000      1.109
+++ malware-apple.pot   31 Jul 2021 17:03:11 -0000      1.110
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -316,10 +316,9 @@
 msgid ""
 "<a "
 
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -341,8 +340,7 @@
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.pt-br.po      31 Jul 2021 07:32:18 -0000      1.5
+++ malware-apple.pt-br.po      31 Jul 2021 17:03:11 -0000      1.6
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -402,12 +402,19 @@
 "graves."
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -451,8 +458,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- malware-apple.ru.po 31 Jul 2021 08:31:02 -0000      1.271
+++ malware-apple.ru.po 31 Jul 2021 17:03:11 -0000      1.272
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -404,12 +405,25 @@
 "предположение, что в престижных 
несвободных программах нет серьезных 
ошибок."
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
@@ -439,13 +453,26 @@
 "взломщиков.</small>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-google.de-diff.html 31 Jul 2021 07:32:18 -0000      1.70
+++ malware-google.de-diff.html 31 Jul 2021 17:03:11 -0000      1.71
@@ -319,7 +319,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -496,7 +496,7 @@
     
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/"&gt;are
     collecting user's personal and identifiable data&lt;/a&gt; including how 
long
     a call lasts, who's participating in the call, and the IP addresses
-    of everyone taking part. From experience, this can even harm users
+    of everyone taking part. From experience, this</em></ins></span> can <span 
class="inserted"><ins><em>even harm users
     physically if those companies hand over data to governments.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -505,8 +505,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google, Apple, and Microsoft (and probably some other companies)
     &lt;a 
href="https://www.lifewire.com/wifi-positioning-system-1683343"&gt;are
-    collecting people's access points and GPS coordinates 
(which</em></ins></span> can
-    <span class="inserted"><ins><em>identify people's precise location) even 
if their GPS is turned
+    collecting people's access points and GPS coordinates (which can
+    identify people's precise location) even if their GPS is turned
     off&lt;/a&gt;, without the person's consent, using proprietary software
     implemented in person's smartphone. Though merely asking for permission
     would not necessarily legitimize this.&lt;/p&gt;
@@ -587,11 +587,11 @@
   &lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses 
run</em></ins></span>
-    by <span class="removed"><del><strong>noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google, Twitter and three other companies are facing 
a lawsuit &lt;a
+    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter and three other companies are facing a lawsuit &lt;a
     
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy by collecting their data from mobile games
+    violating people's privacy</em></ins></span> by <span 
class="removed"><del><strong>noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collecting their data from mobile games
     and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -714,21 +714,21 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers</em></ins></span> send 
<span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
-    data <span class="removed"><del><strong>to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;
+    data <span class="removed"><del><strong>to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308040"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Chrome &lt;a
     href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
-    software.&lt;/p&gt;</em></ins></span>
+    software.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+  &lt;li id="M201308010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
@@ -922,7 +922,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-google.de.po        31 Jul 2021 07:32:18 -0000      1.80
+++ malware-google.de.po        31 Jul 2021 17:03:11 -0000      1.81
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -554,8 +554,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-google.es.po        31 Jul 2021 07:32:18 -0000      1.94
+++ malware-google.es.po        31 Jul 2021 17:03:11 -0000      1.95
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-08 11:03+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -416,8 +416,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-google.fr.po        31 Jul 2021 07:32:18 -0000      1.140
+++ malware-google.fr.po        31 Jul 2021 17:03:11 -0000      1.141
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-30 18:41+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -412,8 +412,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -428,8 +428,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- malware-google.pot  31 Jul 2021 07:32:18 -0000      1.74
+++ malware-google.pot  31 Jul 2021 17:03:11 -0000      1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -313,8 +313,7 @@
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: malware-google.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pt-br.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-google.pt-br.po     31 Jul 2021 07:32:18 -0000      1.10
+++ malware-google.pt-br.po     31 Jul 2021 17:03:11 -0000      1.11
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -418,8 +418,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-google.ru.po        31 Jul 2021 08:31:02 -0000      1.154
+++ malware-google.ru.po        31 Jul 2021 17:03:11 -0000      1.155
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -408,13 +409,26 @@
 "предположение, что в престижных 
несвободных программах нет серьезных 
ошибок."
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- nl.po       31 Jul 2021 07:32:18 -0000      1.333
+++ nl.po       31 Jul 2021 17:03:11 -0000      1.334
@@ -450,10 +450,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -475,8 +475,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -9553,20 +9552,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -9580,14 +9573,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- pl.po       31 Jul 2021 07:32:18 -0000      1.332
+++ pl.po       31 Jul 2021 17:03:11 -0000      1.333
@@ -439,10 +439,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -464,8 +464,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -9034,20 +9033,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -9061,14 +9054,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.331
retrieving revision 1.332
diff -u -b -r1.331 -r1.332
--- pot 31 Jul 2021 07:32:18 -0000      1.331
+++ pot 31 Jul 2021 17:03:11 -0000      1.332
@@ -369,10 +369,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -394,8 +394,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -8309,20 +8308,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -8336,14 +8329,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-insecurity.de-diff.html 31 Jul 2021 07:32:18 -0000      1.86
+++ proprietary-insecurity.de-diff.html 31 Jul 2021 17:03:11 -0000      1.87
@@ -62,50 +62,36 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
-proprietary software that has grave consequences or is otherwise
+&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in proprietary
+software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
 
-&lt;p&gt;It is incorrect to compare free software with a fictitious 
idea</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most</em></ins></span> 
of
-<span class="removed"><del><strong>proprietary software as perfect, but the 
press often implicitly does
-that whenever a</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> security <span 
class="removed"><del><strong>hole</strong></del></span> <span 
class="inserted"><ins><em>flaws are unintentional,
-thus are not malicious functionalities</em></ins></span> in a <span 
class="removed"><del><strong>free program is discovered.  The
-examples below</strong></del></span> <span class="inserted"><ins><em>strict 
sense, we report
-them to</em></ins></span> show that proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>is not immune to bugs,</em></ins></span> and is
-  often quite sloppy.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;p&gt;It would be equally 
incorrect</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;The point of this page is 
not</em></ins></span> to <span class="removed"><del><strong>compare 
proprietary</strong></del></span> <span class="inserted"><ins><em>imply that 
free</em></ins></span> software <span class="removed"><del><strong>with
-a fictitious idea of</strong></del></span> <span class="inserted"><ins><em>is 
immune to
-bugs or insecurities; it's to show that &lt;em&gt;proprietary software has bugs
-    too&lt;/em&gt;, and is not secure as mainstream media may say.&lt;/p&gt;
-
-&lt;p&gt;Handling insecurities in</em></ins></span> free software <span 
class="inserted"><ins><em>is different from doing so in proprietary
-programs. Free software users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span 
class="removed"><del><strong>perfect.  Every nontrivial</strong></del></span> 
<span class="inserted"><ins><em>they are able to share the
-program, while proprietary</em></ins></span> program <span 
class="removed"><del><strong>has bugs,</strong></del></span> <span 
class="inserted"><ins><em>users are forced to rely on the
-  program's developer for fixes.&lt;/p&gt;
-
-&lt;p&gt;If the developer does not care to fix the problem &mdash; often
-the case for embedded software</em></ins></span> and <span 
class="removed"><del><strong>any system,</strong></del></span> <span 
class="inserted"><ins><em>old releases &mdash; the users
-are sunk.  But if the developer does send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.&lt;/p&gt;
-
-&lt;p&gt;All complex programs, whether</em></ins></span> free or proprietary, 
<span class="removed"><del><strong>may have
-security errors.  To err is human, and not culpable.  
But</strong></del></span> <span class="inserted"><ins><em>contain bugs. What
-makes bugs more dangerous in</em></ins></span> proprietary software <span 
class="removed"><del><strong>developers frequently disregard gaping holes, or 
even
-introduce them deliberately.  In any case, they keep</strong></del></span> 
<span class="inserted"><ins><em>is that</em></ins></span> users <span 
class="inserted"><ins><em>are</em></ins></span>
-&lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;. Keeping
-the users helpless is what's culpable about proprietary software.&lt;/p&gt;
+&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>noteworthy. 
Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them to show that
+proprietary software is not as secure as mainstream media may say.&lt;/p&gt;
+
+&lt;p&gt;This doesn't imply that free software</em></ins></span> is <span 
class="removed"><del><strong>incorrect</strong></del></span> <span 
class="inserted"><ins><em>immune</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>bugs or insecurities.
+The difference between</em></ins></span> free <span 
class="inserted"><ins><em>and proprietary</em></ins></span> software <span 
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span 
class="inserted"><ins><em>in this respect is
+the handling</em></ins></span> of
+<span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span 
class="inserted"><ins><em>users are able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are
+able to share the program, while proprietary program users are forced to
+rely on the program's developer for fixes.&lt;/p&gt;
+
+
+&lt;p&gt;If</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
+embedded software and old releases &mdash; the users are sunk. But if the
+developer</em></ins></span> does <span class="inserted"><ins><em>send a 
corrected version, it may contain new malicious
+functionalities as well as bug fixes.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;div class="important"&gt;</em></ins></span>
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
@@ -116,18 +102,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>latest 
version of the proprietary operating
+    if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
 
     &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
+    have to wait until Apple fixes these</em></ins></span> security <span 
class="inserted"><ins><em>holes, if it decides
+    to fix it. A free operating system would let people to identify 
the</em></ins></span>
+    hole <span class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>and fix it.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
     wrongly refers to crackers as &ldquo;&lt;a
@@ -141,10 +124,10 @@
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
-    people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    people's calls, copy their messages, and secretly film them, 
using</em></ins></span> a
+    <span class="inserted"><ins><em>security vulnerability.&lt;/p&gt;
 
-    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    &lt;p&gt;A</em></ins></span> free <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>operating system would've let people to fix the bugs 
for
     themselves but now infected people are forced to wait for corporations to
     fix the problems.&lt;/p&gt;
 
@@ -185,8 +168,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
-    is moving its Chinese customers' iCloud data to a datacenter controlled
+    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple</em></ins></span>
+    is <span class="removed"><del><strong>discovered.</strong></del></span> 
<span class="inserted"><ins><em>moving its Chinese customers' iCloud data to a 
datacenter controlled
     by the Chinese government&lt;/a&gt;. Apple is already storing the 
encryption
     keys on these servers, obeying Chinese authority, making all Chinese
     user data available to the government.&lt;/p&gt;
@@ -225,8 +208,9 @@
     &lt;p&gt;A zero-day vulnerability in Zoom which &lt;a
     
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
     be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
-    disclosed by researchers. The researchers demonstrated a three-bug
-    attack chain that caused an RCE on a target machine, all this without
+    disclosed by researchers.</em></ins></span> The
+<span class="removed"><del><strong>examples below show</strong></del></span> 
<span class="inserted"><ins><em>researchers demonstrated a three-bug
+    attack chain</em></ins></span> that <span class="inserted"><ins><em>caused 
an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -234,14 +218,16 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
+    company's</em></ins></span> proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
+    gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
     Verkada's cameras.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
+    &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
+
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
+    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and 
schools</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span>
+    <span class="inserted"><ins><em>hand &ldquo;security&rdquo; footage to a 
company from which the government can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
@@ -256,19 +242,19 @@
     in the United States are newly &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
     
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
+    in Microsoft's</em></ins></span> proprietary <span 
class="removed"><del><strong>software</strong></del></span> <span 
class="inserted"><ins><em>email software, named Microsoft 365&lt;/a&gt;. It
     is unclear whether there are other holes and vulnerabilities in the
     program or not but history and experience tells us it wouldn't be
-    the last disaster with proprietary programs.&lt;/p&gt;
+    the last disaster</em></ins></span> with <span 
class="inserted"><ins><em>proprietary programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202102110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Researchers at the security firm SentinelOne discovered a &lt;a
+    &lt;p&gt;Researchers at the security firm SentinelOne 
discovered</em></ins></span> a <span class="removed"><del><strong>fictitious 
idea of</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"&gt;security
     flaw in proprietary program Microsoft Windows Defender that lurked
-    undetected for 12 years&lt;/a&gt;. If the program was free (as in freedom),
+    undetected for 12 years&lt;/a&gt;. If the program was</em></ins></span> 
free <span class="inserted"><ins><em>(as in freedom),
     more people would have had a chance to notice the problem, therefore,
     it could've been fixed a lot sooner.&lt;/p&gt;
   &lt;/li&gt;
@@ -318,11 +304,12 @@
     
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department"&gt;malicious
     code was sneaked into SolarWinds' proprietary software named
     Orion&lt;/a&gt;. Crackers got access to networks when users downloaded
-    a tainted software update. Crackers were able to monitor internal
+    a tainted</em></ins></span> software <span 
class="inserted"><ins><em>update. Crackers were able to monitor internal
     emails at some of the top agencies in the US.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Please note that the article
-    wrongly refers to crackers as "&lt;a
+    wrongly refers to crackers</em></ins></span> as <span 
class="removed"><del><strong>perfect.  Every nontrivial
+program has bugs,</strong></del></span> <span class="inserted"><ins><em>"&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -332,10 +319,10 @@
     &lt;p&gt;Baidu apps were &lt;a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
     caught collecting sensitive personal data&lt;/a&gt; that can be used for
-    lifetime tracking of users, and putting them in danger. More than 1.4
+    lifetime tracking of users,</em></ins></span> and <span 
class="removed"><del><strong>any system, free or 
proprietary,</strong></del></span> <span class="inserted"><ins><em>putting them 
in danger. More than 1.4
     billion people worldwide are affected by these proprietary apps, and
     users' privacy is jeopardized by this surveillance tool. Data collected
-    by Baidu may be handed over to the Chinese government, possibly
+    by Baidu</em></ins></span> may <span 
class="removed"><del><strong>have</strong></del></span> <span 
class="inserted"><ins><em>be handed over to the Chinese government, possibly
     putting Chinese people in danger.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -376,7 +363,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
+    A disasterous</em></ins></span> security <span 
class="removed"><del><strong>errors.  To err</strong></del></span> <span 
class="inserted"><ins><em>bug&lt;/a&gt; touches millions of products in the
     Internet of Stings.&lt;/p&gt;
 
     &lt;p&gt;As a result, anyone can sting the user, not only the
@@ -396,7 +383,7 @@
   &lt;li id="M202004150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
+    &lt;p&gt;Riot Games' new anti-cheat</em></ins></span> is <span 
class="removed"><del><strong>human,</strong></del></span> <span 
class="inserted"><ins><em>malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
     on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
     that increases the attack surface of the operating system.&lt;/p&gt;
@@ -409,7 +396,7 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
     managed to interfere the Amazon Ring proprietary system, and &lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
-    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
+    its camera, speakers</em></ins></span> and <span 
class="inserted"><ins><em>microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
@@ -421,10 +408,11 @@
     access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
     out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
+    security, including encryption.</em></ins></span> But <span 
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
+    software <span class="removed"><del><strong>developers frequently 
disregard gaping holes, or even
+introduce them deliberately.  In any case,</strong></del></span> <span 
class="inserted"><ins><em>lack this. Of course,</em></ins></span> they <span 
class="removed"><del><strong>keep</strong></del></span> <span 
class="inserted"><ins><em>are also used by their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -438,22 +426,26 @@
     the user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent on Apple
+    Apple's proprietary software makes</em></ins></span> users
+<span class="removed"><del><strong>&lt;em&gt;helpless</strong></del></span> 
<span class="inserted"><ins><em>totally dependent on Apple
     for even a modicum of security.  It also means that the devices do
-    not even try to offer security against Apple itself.&lt;/p&gt;
+    not even try</em></ins></span> to <span class="removed"><del><strong>fix 
any</strong></del></span> <span 
class="inserted"><ins><em>offer</em></ins></span> security <span 
class="removed"><del><strong>problems</strong></del></span> <span 
class="inserted"><ins><em>against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by security researchers, eight &lt;a
+    &lt;p&gt;Out of 21 gratis Android antivirus apps</em></ins></span>
+    that <span class="removed"><del><strong>arise&lt;/em&gt;.  
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by 
security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
     failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
-    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+    risky than</em></ins></span> the
+<span class="removed"><del><strong>users helpless is what's culpable 
about</strong></del></span> <span class="inserted"><ins><em>average of the 100 
most popular Android apps.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to 
these</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
+&lt;p&gt;If you know</strong></del></span> <span 
class="inserted"><ins><em>apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -473,7 +465,7 @@
   &lt;li id="M201905150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
+    &lt;p&gt;Users caught in the jail</em></ins></span> of an <span 
class="removed"><del><strong>example</strong></del></span> <span 
class="inserted"><ins><em>iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
@@ -487,14 +479,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
+    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>ought</strong></del></span> <span 
class="inserted"><ins><em>affect several models of implantable
     defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
+    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span 
class="removed"><del><strong>be</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
+    developers to fix bugs</em></ins></span> in <span 
class="removed"><del><strong>this page but isn't
+here, please write</strong></del></span> <span class="inserted"><ins><em>their 
products.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902270"&gt;
@@ -508,9 +501,9 @@
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon to change the design that &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+    do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change the design that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon</em></ins></span> to <span class="removed"><del><strong>inform us. 
Please include</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809240"&gt;
@@ -525,9 +518,9 @@
   &lt;li id="M201808130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Since the beginning of 2017, &lt;a
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>URL</strong></del></span> <span 
class="inserted"><ins><em>beginning of 2017, &lt;a
     
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
-    phones have been collecting the addresses of nearby cellular
+    phones have been collecting the addresses</em></ins></span> of <span 
class="inserted"><ins><em>nearby cellular
     towers&lt;/a&gt;, even when location services are disabled, and sending
     that data back to Google.&lt;/p&gt;
   &lt;/li&gt;
@@ -535,13 +528,16 @@
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>trustworthy reference</strong></del></span> <span 
class="inserted"><ins><em>way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
+    easier for Amazon. And if some government such as China</em></ins></span> 
or <span class="removed"><del><strong>two</strong></del></span> <span 
class="inserted"><ins><em>the US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>product in 
that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
@@ -1219,17 +1215,17 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Due to bad security in a drug pump, crackers could use it to
 &lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
@@ -1321,12 +1317,10 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1339,10 +1333,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
+    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1526,7 +1522,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary-insecurity.de.po        31 Jul 2021 07:32:18 -0000      1.184
+++ proprietary-insecurity.de.po        31 Jul 2021 17:03:11 -0000      1.185
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -128,20 +128,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -155,14 +149,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><div><p>
 # | If you know of an example that ought to be in this page but isn't here,
 # | please write to <a
@@ -190,10 +176,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -227,8 +213,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-insecurity.es.po        31 Jul 2021 07:32:18 -0000      1.116
+++ proprietary-insecurity.es.po        31 Jul 2021 17:03:11 -0000      1.117
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -85,12 +85,25 @@
 "Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Esta página ofrece una lista de casos comprobados de inseguridad en el "
 "software privativo con graves consecuencias o dignos de mención. Aun cuando "
@@ -101,15 +114,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -123,26 +130,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-# || No change detected.  The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todo programa complejo, sea libre o privativo, contiene fallos. Lo que hace "
-"que los fallos sean más peligrosos en el software privativo es que los "
-"usuarios se ven <em>imposibilitados para subsanar cualquier problema de "
-"seguridad que surja</em>. El software privativo es culpable de mantener a "
-"los usuarios en la indefensión."
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -158,10 +145,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -186,8 +173,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -1827,3 +1813,21 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todo programa complejo, sea libre o privativo, contiene fallos. Lo que "
+#~ "hace que los fallos sean más peligrosos en el software privativo es que "
+#~ "los usuarios se ven <em>imposibilitados para subsanar cualquier problema "
+#~ "de seguridad que surja</em>. El software privativo es culpable de "
+#~ "mantener a los usuarios en la indefensión."

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary-insecurity.fr.po        31 Jul 2021 07:32:18 -0000      1.266
+++ proprietary-insecurity.fr.po        31 Jul 2021 17:03:12 -0000      1.267
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-30 18:41+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -82,12 +82,25 @@
 msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Cette page répertorie des failles de sécurité de logiciels privateurs, "
 "failles clairement établies qui ont de graves conséquences ou méritent "
@@ -99,15 +112,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -121,27 +128,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-# || No change detected.  The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Tous les programmes complexes, qu'ils soient libres ou privateurs, "
-"contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans le "
-"logiciel privateur est que <em>les utilisateurs n'ont pas la possibilité de "
-"corriger eux-mêmes les problèmes de sécurité qui pourraient 
survenir</em>.  "
-"C'est le fait de priver les utilisateurs de cette possibilité qui est "
-"coupable dans le logiciel privateur."
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -156,12 +142,25 @@
 "pour l'étayer."
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -194,8 +193,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -210,8 +209,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
@@ -1866,3 +1864,22 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Tous les programmes complexes, qu'ils soient libres ou privateurs, "
+#~ "contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans "
+#~ "le logiciel privateur est que <em>les utilisateurs n'ont pas la "
+#~ "possibilité de corriger eux-mêmes les problèmes de sécurité qui "
+#~ "pourraient survenir</em>.  C'est le fait de priver les utilisateurs de "
+#~ "cette possibilité qui est coupable dans le logiciel privateur."

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-insecurity.it-diff.html 31 Jul 2021 07:32:18 -0000      1.99
+++ proprietary-insecurity.it-diff.html 31 Jul 2021 17:03:12 -0000      1.100
@@ -62,41 +62,35 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
-proprietary software that has grave consequences or is otherwise
+&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in proprietary
+software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
 
-&lt;p&gt;It</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most of these security 
flaws are unintentional,
-thus are not malicious functionalities in a strict sense, we report
-them to show that proprietary software</em></ins></span> is <span 
class="removed"><del><strong>incorrect</strong></del></span> <span 
class="inserted"><ins><em>not immune</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>bugs, and is
-  often quite sloppy.&lt;/p&gt;
-
-&lt;p&gt;The point of this page is not to imply that</em></ins></span> free 
software <span class="removed"><del><strong>with a fictitious idea 
of</strong></del></span> <span class="inserted"><ins><em>is immune to
-bugs or insecurities; it's to show that &lt;em&gt;proprietary software has bugs
-    too&lt;/em&gt;, and is not secure as mainstream media may say.&lt;/p&gt;
-
-&lt;p&gt;Handling insecurities in free software is different from doing so 
in</em></ins></span> proprietary
-<span class="inserted"><ins><em>programs. Free</em></ins></span> software 
<span class="inserted"><ins><em>users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span 
class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are able to share the
-program, while proprietary program users are forced to rely 
on</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span>
-  <span class="inserted"><ins><em>program's developer for fixes.&lt;/p&gt;
-
-&lt;p&gt;If the developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span>
-<span class="inserted"><ins><em>the case for embedded software and old 
releases &mdash; the users
-are sunk.  But if the developer</em></ins></span> does <span 
class="inserted"><ins><em>send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.&lt;/p&gt;
-
-&lt;p&gt;All complex programs, whether free or proprietary, contain bugs. What
-makes bugs more dangerous in proprietary software is</em></ins></span> that 
<span class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>users are
-&lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;. Keeping
-the users helpless is what's culpable about proprietary software.&lt;/p&gt;
+&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>noteworthy. 
Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them to show that
+proprietary software is not as secure as mainstream media may say.&lt;/p&gt;
+
+&lt;p&gt;This doesn't imply that free software</em></ins></span> is <span 
class="removed"><del><strong>incorrect</strong></del></span> <span 
class="inserted"><ins><em>immune</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>bugs or insecurities.
+The difference between</em></ins></span> free <span 
class="inserted"><ins><em>and proprietary</em></ins></span> software <span 
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span 
class="inserted"><ins><em>in this respect is
+the handling</em></ins></span> of
+<span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span 
class="inserted"><ins><em>users are able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are
+able to share</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>program, while proprietary program users are forced to
+rely on the program's developer for fixes.&lt;/p&gt;
+
+
+&lt;p&gt;If the developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
+embedded software and old releases &mdash; the users are sunk. But if the
+developer</em></ins></span> does <span class="inserted"><ins><em>send a 
corrected version, it may contain new malicious
+functionalities as well as bug fixes.&lt;/p&gt;
+
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
+&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -108,7 +102,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used</em></ins></span> a <span class="inserted"><ins><em>zero-day and 
zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -131,7 +125,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, 
using</em></ins></span> a
-    <span class="inserted"><ins><em>zero-click (means no interaction is 
needed) vulnerability.&lt;/p&gt;
+    <span class="inserted"><ins><em>security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A</em></ins></span> free <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>operating system would've let people to fix the bugs 
for
     themselves but now infected people are forced to wait for corporations to
@@ -191,7 +185,7 @@
     the payments don't go through&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;They say there is a 30-days grace period if you miss a payment
-    but the grace period</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>no excuse to the insecurity.&lt;/p&gt;
+    but the grace period is no excuse to the insecurity.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202105030"&gt;
@@ -202,7 +196,7 @@
     up with private companies to monitor American citizens' private online
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;What creates the opportunity to try this is the fact that these
+    &lt;p&gt;What creates the opportunity to try this</em></ins></span> is 
<span class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>the fact that these
     companies are already snooping on users' private activities. That
     in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
@@ -231,9 +225,9 @@
 
     &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
 
-&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span>
-    to <span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>the public&lt;/a&gt; for gyms, stores, hospitals, 
jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
+    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
+    hand &ldquo;security&rdquo; footage</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>a company from which the government can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
@@ -400,7 +394,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed to interfere the Amazon Ring proprietary system, and &lt;a
+    managed to interfere the Amazon Ring proprietary system,</em></ins></span> 
and <span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -411,7 +405,7 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
@@ -553,7 +547,7 @@
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa,</em></ins></span> and <span 
class="inserted"><ins><em>all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -573,7 +567,7 @@
     &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
     is that, if you lose your internet service, you also &lt;a
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+    lose control of your house</em></ins></span> and <span 
class="inserted"><ins><em>appliances&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For your safety, don't</em></ins></span> use <span 
class="inserted"><ins><em>any appliance with a connection to the
     real internet.&lt;/p&gt;
@@ -1104,19 +1098,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1237,8 +1231,8 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-The FTC punished a company</strong></del></span> for <span 
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them&lt;/a&gt;.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span 
class="removed"><del><strong>anyone to watch them&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -1295,20 +1289,20 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
     href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;</em></ins></span>
+    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201402210"&gt;
+  &lt;li id="M201402210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
@@ -1501,7 +1495,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary-insecurity.it.po        31 Jul 2021 07:32:18 -0000      1.201
+++ proprietary-insecurity.it.po        31 Jul 2021 17:03:12 -0000      1.202
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -123,20 +123,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -150,14 +144,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><div><p>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
@@ -180,10 +166,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -205,8 +191,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-insecurity.ja-diff.html 31 Jul 2021 07:32:18 -0000      1.120
+++ proprietary-insecurity.ja-diff.html 31 Jul 2021 17:03:12 -0000      1.121
@@ -62,37 +62,29 @@
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
-&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in
-proprietary software that has grave consequences or is otherwise
+&lt;p&gt;This</em></ins></span> page lists clearly established cases of 
insecurity in proprietary
+software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
 
-&lt;p&gt;It would be incorrect</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most of these security 
flaws are unintentional,
-thus are not malicious functionalities in a strict sense, we report
-them</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>show that</em></ins></span> proprietary software 
<span class="removed"><del><strong>with a
-fictitious idea</strong></del></span> <span class="inserted"><ins><em>is not 
immune to bugs, and is
-  often quite sloppy.&lt;/p&gt;
-
-&lt;p&gt;The point</em></ins></span> of <span class="inserted"><ins><em>this 
page is not to imply that</em></ins></span> free software <span 
class="inserted"><ins><em>is immune to
-bugs or insecurities; it's to show that &lt;em&gt;proprietary software has bugs
-    too&lt;/em&gt;, and is not secure as mainstream media may say.&lt;/p&gt;
-
-&lt;p&gt;Handling insecurities in free software is different from doing so in 
proprietary
-programs. Free software users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span 
class="removed"><del><strong>perfect.  Every nontrivial</strong></del></span> 
<span class="inserted"><ins><em>they are able to share the
-program, while proprietary</em></ins></span> program
-<span class="removed"><del><strong>has bugs,</strong></del></span> <span 
class="inserted"><ins><em>users are forced to rely on the
-  program's developer for fixes.&lt;/p&gt;
-
-&lt;p&gt;If the developer does not care to fix the problem &mdash; often
-the case for embedded software</em></ins></span> and <span 
class="removed"><del><strong>any system,</strong></del></span> <span 
class="inserted"><ins><em>old releases &mdash; the users
-are sunk.  But if the developer does send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.&lt;/p&gt;
-
-&lt;p&gt;All complex programs, whether</em></ins></span> free or proprietary, 
<span class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>contain bugs. What
-makes bugs more dangerous in proprietary software is that users are
-&lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;. Keeping
-the users helpless is what's culpable about proprietary software.&lt;/p&gt;
+&lt;p&gt;It would be incorrect</strong></del></span> <span 
class="inserted"><ins><em>noteworthy. Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them</em></ins></span> 
to <span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>show that</em></ins></span>
+proprietary software <span class="removed"><del><strong>with a
+fictitious idea</strong></del></span> <span class="inserted"><ins><em>is not 
as secure as mainstream media may say.&lt;/p&gt;
+
+&lt;p&gt;This doesn't imply that free software is immune to bugs or 
insecurities.
+The difference between free and proprietary software in this respect is
+the handling</em></ins></span> of <span class="inserted"><ins><em>the 
bugs:</em></ins></span> free software <span class="inserted"><ins><em>users are 
able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect.  Every 
nontrivial</strong></del></span> <span class="inserted"><ins><em>they are
+able to share the program, while proprietary</em></ins></span> program <span 
class="inserted"><ins><em>users are forced to
+rely on the program's developer for fixes.&lt;/p&gt;
+
+
+&lt;p&gt;If the developer does not care to fix the problem &mdash; often the 
case for
+embedded software and old releases &mdash; the users are sunk. But if the
+developer does send a corrected version, it may contain new malicious
+functionalities as well as bug fixes.&lt;/p&gt;
+
 
 &lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
@@ -110,14 +102,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
 
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and 
people</em></ins></span>
-    have <span class="inserted"><ins><em>to wait until Apple fixes 
these</em></ins></span> security
-<span class="removed"><del><strong>holes.</strong></del></span> <span 
class="inserted"><ins><em>holes, if it decides
+    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
     to fix it. A free operating system would let people to identify the
     hole and fix it.&lt;/p&gt;
 
@@ -134,7 +125,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -206,8 +197,8 @@
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;What creates the opportunity to try this is the fact that these
-    companies are already snooping on users' private 
activities.</em></ins></span> That
-    in <span class="removed"><del><strong>itself</strong></del></span> <span 
class="inserted"><ins><em>turn is due to people's use of nonfree software which 
snoops,
+    companies are already snooping on users' private activities. That
+    in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -216,7 +207,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A zero-day vulnerability in Zoom which &lt;a
     
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
-    be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
+    be used to launch remote code execution (RCE) 
attacks&lt;/a&gt;</em></ins></span> has <span 
class="removed"><del><strong>bugs,</strong></del></span> <span 
class="inserted"><ins><em>been
     disclosed by researchers. The researchers demonstrated a three-bug
     attack chain that caused an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
@@ -228,13 +219,13 @@
     &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
     company's proprietary software are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
+    gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
     Verkada's cameras.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
     to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
     hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
+    collect it at</em></ins></span> any <span 
class="removed"><del><strong>system, free</strong></del></span> <span 
class="inserted"><ins><em>time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
     wrongly refers to crackers as &ldquo;&lt;a
@@ -250,7 +241,7 @@
     
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
     in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
     is unclear whether there are other holes and vulnerabilities in the
-    program or not but history and experience tells us it wouldn't be
+    program</em></ins></span> or <span 
class="removed"><del><strong>proprietary, may</strong></del></span> <span 
class="inserted"><ins><em>not but history and experience tells us it wouldn't be
     the last disaster with proprietary programs.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -261,7 +252,7 @@
     
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"&gt;security
     flaw in proprietary program Microsoft Windows Defender that lurked
     undetected for 12 years&lt;/a&gt;. If the program was free (as in freedom),
-    more people would have had a chance to notice the problem, therefore,
+    more people would</em></ins></span> have <span 
class="inserted"><ins><em>had a chance to notice the problem, therefore,
     it could've been fixed a lot sooner.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -340,7 +331,7 @@
     and reports users' computing to Apple.&lt;/p&gt;
 
     &lt;p&gt;The reports are even unencrypted and they've been leaking this
-    data for two years already. This malware</em></ins></span> is <span 
class="inserted"><ins><em>reporting to Apple what
+    data for two years already. This malware is reporting to Apple what
     user opens what program at what time. It also gives Apple
     power to sabotage users' computing.&lt;/p&gt;
   &lt;/li&gt;
@@ -368,10 +359,11 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous security bug&lt;/a&gt; touches millions of products in the
+    A disasterous</em></ins></span> security
+<span class="removed"><del><strong>holes.  That</strong></del></span> <span 
class="inserted"><ins><em>bug&lt;/a&gt; touches millions of 
products</em></ins></span> in <span 
class="removed"><del><strong>itself</strong></del></span> <span 
class="inserted"><ins><em>the
     Internet of Stings.&lt;/p&gt;
 
-    &lt;p&gt;As a result, anyone can sting the user,</em></ins></span> not 
<span class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>only the
+    &lt;p&gt;As a result, anyone can sting the user, not only the
     manufacturer.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -390,7 +382,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
-    on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
+    on system boot at kernel level&lt;/a&gt; on Windows. It</em></ins></span> 
is <span class="inserted"><ins><em>insecure software
     that increases the attack surface of the operating system.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -413,7 +405,7 @@
     access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
     out any significant surveillance if the devices implemented proper
     security, including encryption.</em></ins></span> But <span 
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
     software
@@ -455,7 +447,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>when the user says &lt;a
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
@@ -472,7 +464,7 @@
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>if it didn't lead to security threats as 
well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
@@ -532,7 +524,8 @@
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    &lt;p&gt;It was very difficult for</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
@@ -582,7 +575,7 @@
   &lt;li id="M201711200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+    &lt;p&gt;Amazon recently invited consumers to be suckers</em></ins></span> 
and <span class="removed"><del><strong>&lt;em&gt;the</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
     it, the system has a grave security flaw.&lt;/p&gt;
@@ -632,8 +625,7 @@
     &lt;p&gt;That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
-    find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to get into users' cameras&lt;/a&gt;.&lt;/p&gt;
+    find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706050"&gt;
@@ -647,7 +639,7 @@
     &lt;p&gt;The vulnerability allowed a cracker to access
     the computer's Intel Active Management Technology (AMT) &lt;a
     
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-    web interface with an empty password</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>gave administrative
+    web interface with an empty password and gave administrative
     access&lt;/a&gt; to access the computer's keyboard, mouse, monitor among
     other privileges.&lt;/p&gt;
 
@@ -1224,10 +1216,12 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1240,12 +1234,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
+    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
+  &lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1430,7 +1422,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary-insecurity.ja.po        31 Jul 2021 07:32:18 -0000      1.173
+++ proprietary-insecurity.ja.po        31 Jul 2021 17:03:12 -0000      1.174
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -106,20 +106,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -133,14 +127,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -156,10 +142,10 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -181,8 +167,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-insecurity.pot  31 Jul 2021 07:32:18 -0000      1.139
+++ proprietary-insecurity.pot  31 Jul 2021 17:03:12 -0000      1.140
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,20 +74,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs "
-"too</em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program "
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program "
 "and/or fix the bugs they find, often in communities as they are able to "
 "share the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -101,14 +95,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -122,10 +108,9 @@
 msgid ""
 "<a "
 
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -147,8 +132,7 @@
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-insecurity.pt-br.po     31 Jul 2021 07:32:18 -0000      1.10
+++ proprietary-insecurity.pt-br.po     31 Jul 2021 17:03:12 -0000      1.11
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -78,12 +78,19 @@
 msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Esta página lista casos claramente estabelecidos de insegurança em software 
"
 "privativo que têm consequências graves ou são dignos de nota. Embora a "
@@ -94,15 +101,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -116,24 +117,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todos os programas complexos, sejam livres ou privativos, contêm bugs. O que 
"
-"torna os bugs mais perigosos em software privativo é que os usuários são "
-"<em>incapazes de corrigir quaisquer problemas de segurança que surjam</em>. "
-"Manter os usuários desamparados é o que é culpado no software privativo."
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -147,12 +130,19 @@
 "ou duas referências confiáveis para servir como comprovação específica."
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -196,8 +186,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
@@ -1826,3 +1815,21 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todos os programas complexos, sejam livres ou privativos, contêm bugs. O "
+#~ "que torna os bugs mais perigosos em software privativo é que os usuários 
"
+#~ "são <em>incapazes de corrigir quaisquer problemas de segurança que "
+#~ "surjam</em>. Manter os usuários desamparados é o que é culpado no "
+#~ "software privativo."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary-insecurity.ru.po        31 Jul 2021 08:31:02 -0000      1.312
+++ proprietary-insecurity.ru.po        31 Jul 2021 17:03:12 -0000      1.313
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -80,12 +81,25 @@
 msgstr "Как правило, это принимает форму 
вредоносных функций."
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "На этой странице перечисляются ясно 
установленные случаи уязвимости "
 "несвободных программ, которые имели 
тяжкие последствия или примечательны по "
@@ -95,20 +109,24 @@
 "ошибки, и часто весьма грубые."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-"Смысл этой страницы не в том, что 
свободные программы не подвержены ошибкам "
-"или недочетам в защите; страница 
показывает, что <em>в несвободных "
-"программах тоже есть ошибки</em>, и они не 
так защищены, как могут говорить "
-"популярные средства массовой информации."
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+# | [-Handling insecurities in-]{+This doesn't imply that+} free software is
+# | [-different from doing so in-] {+immune to bugs or insecurities.  The
+# | difference between free and+} proprietary [-programs. Free-] {+software in
+# | this respect is the handling of the bugs: free+} software users are able
+# | to study the program and/or fix the bugs they find, often in communities
+# | as they are able to share the program, while proprietary program users are
+# | forced to rely on the program's developer for fixes.
+#, fuzzy
+#| msgid ""
+#| "Handling insecurities in free software is different from doing so in "
+#| "proprietary programs. Free software users are able to study the program "
+#| "and/or fix the bugs they find, often in communities as they are able to "
+#| "share the program, while proprietary program users are forced to rely on "
+#| "the program's developer for fixes."
+msgid ""
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -120,6 +138,13 @@
 "программы вынуждены полагаться в 
исправлениях на разработчика программы."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If the developer does not care to fix the problem &mdash; often the case "
+#| "for embedded software and old releases &mdash; the users are sunk.  But "
+#| "if the developer does send a corrected version, it may contain new "
+#| "malicious functionalities as well as bug fixes."
 msgid ""
 "If the developer does not care to fix the problem &mdash; often the case for "
 "embedded software and old releases &mdash; the users are sunk.  But if the "
@@ -132,19 +157,6 @@
 "исправленную версию, в ней вместе с 
исправлениями ошибок могут быть новые "
 "вредоносные функции."
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Все сложные программы, как свободные, так 
и несвободные, содержат ошибки. "
-"Более опасными ошибки в несвободных 
программах делает то, что пользователи "
-"<em>беспомощны при необходимости исправить 
любые проблемы безопасности, "
-"которые возникают</em>. Именно то, что 
пользователей оставляют беспомощными, "
-"достойно порицания в несвободных 
программах."
-
 #. type: Content of: <div><div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
@@ -158,12 +170,25 @@
 "качестве конкретных свидетельств."
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
@@ -193,13 +218,26 @@
 "взломщиков.</small>"
 
 #. type: Content of: <div><div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "
@@ -1828,6 +1866,28 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#~ msgid ""
+#~ "The point of this page is not to imply that free software is immune to "
+#~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "
+#~ "too</em>, and is not secure as mainstream media may say."
+#~ msgstr ""
+#~ "Смысл этой страницы не в том, что 
свободные программы не подвержены "
+#~ "ошибкам или недочетам в защите; страница 
показывает, что <em>в "
+#~ "несвободных программах тоже есть 
ошибки</em>, и они не так защищены, как "
+#~ "могут говорить популярные средства 
массовой информации."
+
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Все сложные программы, как свободные, 
так и несвободные, содержат ошибки. "
+#~ "Более опасными ошибки в несвободных 
программах делает то, что "
+#~ "пользователи <em>беспомощны при необх
одимости исправить любые проблемы "
+#~ "безопасности, которые возникают</em>. 
Именно то, что пользователей "
+#~ "оставляют беспомощными, достойно 
порицания в несвободных программах."
+
 #, fuzzy
 #~| msgid ""
 #~| "<small>(Please note that the article wrongly refers to crackers as \"<a "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.de-diff.html    31 Jul 2021 07:32:18 -0000      1.289
+++ proprietary.de-diff.html    31 Jul 2021 17:03:12 -0000      1.290
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;</em></ins></span>
+   text-decoration: none;
 }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -229,7 +229,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -252,7 +252,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -379,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary.de.po   31 Jul 2021 07:32:18 -0000      1.306
+++ proprietary.de.po   31 Jul 2021 17:03:12 -0000      1.307
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -481,10 +481,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -518,8 +518,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.493
retrieving revision 1.494
diff -u -b -r1.493 -r1.494
--- proprietary.es.po   31 Jul 2021 07:32:18 -0000      1.493
+++ proprietary.es.po   31 Jul 2021 17:03:12 -0000      1.494
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -343,10 +343,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -371,8 +371,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.520
retrieving revision 1.521
diff -u -b -r1.520 -r1.521
--- proprietary.fr.po   31 Jul 2021 07:32:18 -0000      1.520
+++ proprietary.fr.po   31 Jul 2021 17:03:12 -0000      1.521
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-30 18:41+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -338,12 +338,25 @@
 msgstr "Ajouts récents"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -376,8 +389,8 @@
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
 # | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
 #, fuzzy
 #| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
@@ -392,8 +405,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary.it-diff.html    31 Jul 2021 07:32:18 -0000      1.299
+++ proprietary.it-diff.html    31 Jul 2021 17:03:12 -0000      1.300
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;</em></ins></span>
+   text-decoration: none;
 }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -228,7 +228,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -251,7 +251,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -378,7 +378,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary.it.po   31 Jul 2021 07:32:18 -0000      1.315
+++ proprietary.it.po   31 Jul 2021 17:03:12 -0000      1.316
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,10 +486,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -511,8 +511,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary.ja-diff.html    31 Jul 2021 07:32:18 -0000      1.304
+++ proprietary.ja-diff.html    31 Jul 2021 17:03:12 -0000      1.305
@@ -233,7 +233,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -256,7 +256,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -383,7 +383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary.ja.po   31 Jul 2021 07:32:18 -0000      1.298
+++ proprietary.ja.po   31 Jul 2021 17:03:12 -0000      1.299
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -344,10 +344,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -369,8 +369,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary.nl-diff.html    31 Jul 2021 07:32:19 -0000      1.300
+++ proprietary.nl-diff.html    31 Jul 2021 17:03:12 -0000      1.301
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;</em></ins></span>
+   text-decoration: none;
 }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -228,7 +228,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -251,7 +251,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -378,7 +378,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.nl.po   31 Jul 2021 07:32:19 -0000      1.289
+++ proprietary.nl.po   31 Jul 2021 17:03:12 -0000      1.290
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -389,10 +389,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -414,8 +414,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- proprietary.pl-diff.html    31 Jul 2021 07:32:19 -0000      1.316
+++ proprietary.pl-diff.html    31 Jul 2021 17:03:12 -0000      1.317
@@ -199,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -227,7 +227,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -250,7 +250,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -377,7 +377,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- proprietary.pl.po   31 Jul 2021 07:32:19 -0000      1.281
+++ proprietary.pl.po   31 Jul 2021 17:03:12 -0000      1.282
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -570,10 +570,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -595,8 +595,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.pot     31 Jul 2021 07:32:19 -0000      1.278
+++ proprietary.pot     31 Jul 2021 17:03:12 -0000      1.279
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -282,10 +282,9 @@
 msgid ""
 "<a "
 
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -307,8 +306,7 @@
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.443
retrieving revision 1.444
diff -u -b -r1.443 -r1.444
--- proprietary.pt-br.po        31 Jul 2021 07:32:19 -0000      1.443
+++ proprietary.pt-br.po        31 Jul 2021 17:03:12 -0000      1.444
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -335,12 +335,19 @@
 msgstr "Últimas adições"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -384,8 +391,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.539
retrieving revision 1.540
diff -u -b -r1.539 -r1.540
--- proprietary.ru.po   31 Jul 2021 08:31:02 -0000      1.539
+++ proprietary.ru.po   31 Jul 2021 17:03:12 -0000      1.540
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -339,12 +340,25 @@
 msgstr "Последние добавления"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
@@ -374,13 +388,26 @@
 "взломщиков.</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.tr.po   31 Jul 2021 12:42:17 -0000      1.188
+++ proprietary.tr.po   31 Jul 2021 17:03:12 -0000      1.189
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-31 14:40+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -335,12 +336,19 @@
 msgstr "Son eklenenler"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "Kırıcılar, iAygıtlarında en son sürüm özel mülk işletim sistemi 
kurulu bile "
 "olsa, çoğu gazeteci olan insanların aygıtlarına <a 
href=\"https://www.xda-";
@@ -369,13 +377,20 @@
 "adlandırmaktır.</small>"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "Pegasus casus yazılımı, insanları gözetim altına almak için <a href="
 "\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-";

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.zh-cn.po        31 Jul 2021 07:32:19 -0000      1.236
+++ proprietary.zh-cn.po        31 Jul 2021 17:03:12 -0000      1.237
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2021-07-16 16:36+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -317,10 +317,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -344,8 +344,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary.zh-tw-diff.html 31 Jul 2021 07:32:19 -0000      1.279
+++ proprietary.zh-tw-diff.html 31 Jul 2021 17:03:12 -0000      1.280
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;</em></ins></span>
+   text-decoration: none;
 }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -229,7 +229,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
@@ -252,7 +252,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.&lt;/p&gt;
+    security vulnerability.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -379,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary.zh-tw.po        31 Jul 2021 07:32:19 -0000      1.268
+++ proprietary.zh-tw.po        31 Jul 2021 17:03:12 -0000      1.269
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -459,10 +459,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -484,8 +484,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.414
retrieving revision 1.415
diff -u -b -r1.414 -r1.415
--- pt-br.po    31 Jul 2021 07:32:19 -0000      1.414
+++ pt-br.po    31 Jul 2021 17:03:12 -0000      1.415
@@ -507,12 +507,19 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -556,8 +563,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
@@ -12185,12 +12191,19 @@
 msgstr "Insegurança privativa"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "Esta página lista casos claramente estabelecidos de insegurança em software 
"
 "privativo que têm consequências graves ou são dignos de nota. Embora a "
@@ -12201,15 +12214,9 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -12223,24 +12230,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todos os programas complexos, sejam livres ou privativos, contêm bugs. O que 
"
-"torna os bugs mais perigosos em software privativo é que os usuários são "
-"<em>incapazes de corrigir quaisquer problemas de segurança que surjam</em>. "
-"Manter os usuários desamparados é o que é culpado no software privativo."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "
@@ -13352,6 +13341,77 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
+#~ "vulnerabilidades em sistemas operacionais proprietários de smartphones </"
+#~ "a> para impor vigilância às pessoas. Ele pode gravar ligações das "
+#~ "pessoas, copiar suas mensagens e filmá-las secretamente, usando "
+#~ "vulnerabilidades de zero-click (significa que nenhuma interação é "
+#~ "necessária) e zero-day (significa que o bug ainda não foi encontrado)."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Esta página lista casos claramente estabelecidos de insegurança em "
+#~ "software privativo que têm consequências graves ou são dignos de nota. "
+#~ "Embora a maioria dessas falhas de segurança não sejam intencionais, "
+#~ "portanto, não são funcionalidades mal-intencionadas em sentido estrito, "
+#~ "nós as relatamos para mostrar que o software privativo não é imune a 
bugs "
+#~ "e costuma ser bastante desleixado."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todos os programas complexos, sejam livres ou privativos, contêm bugs. O "
+#~ "que torna os bugs mais perigosos em software privativo é que os usuários 
"
+#~ "são <em>incapazes de corrigir quaisquer problemas de segurança que "
+#~ "surjam</em>. Manter os usuários desamparados é o que é culpado no "
+#~ "software privativo."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.696
retrieving revision 1.697
diff -u -b -r1.696 -r1.697
--- ru.po       31 Jul 2021 09:00:58 -0000      1.696
+++ ru.po       31 Jul 2021 17:03:12 -0000      1.697
@@ -508,12 +508,25 @@
 msgstr "</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
 "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
@@ -543,13 +556,26 @@
 "взломщиков.</small>"
 
 #. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> Программа-шпион Pegasus 
применяла "
@@ -12327,12 +12353,25 @@
 msgstr "Уязвимость несвободных программ"
 
 #. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
 msgid ""
 "This page lists clearly established cases of insecurity in proprietary "
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 "На этой странице перечисляются ясно 
установленные случаи уязвимости "
 "несвободных программ, которые имели 
тяжкие последствия или примечательны по "
@@ -12342,20 +12381,24 @@
 "ошибки, и часто весьма грубые."
 
 #. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-"Смысл этой страницы не в том, что 
свободные программы не подвержены ошибкам "
-"или недочетам в защите; страница 
показывает, что <em>в несвободных "
-"программах тоже есть ошибки</em>, и они не 
так защищены, как могут говорить "
-"популярные средства массовой информации."
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+# | [-Handling insecurities in-]{+This doesn't imply that+} free software is
+# | [-different from doing so in-] {+immune to bugs or insecurities.  The
+# | difference between free and+} proprietary [-programs. Free-] {+software in
+# | this respect is the handling of the bugs: free+} software users are able
+# | to study the program and/or fix the bugs they find, often in communities
+# | as they are able to share the program, while proprietary program users are
+# | forced to rely on the program's developer for fixes.
+#, fuzzy
+#| msgid ""
+#| "Handling insecurities in free software is different from doing so in "
+#| "proprietary programs. Free software users are able to study the program "
+#| "and/or fix the bugs they find, often in communities as they are able to "
+#| "share the program, while proprietary program users are forced to rely on "
+#| "the program's developer for fixes."
+msgid ""
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -12367,6 +12410,13 @@
 "программы вынуждены полагаться в 
исправлениях на разработчика программы."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If the developer does not care to fix the problem &mdash; often the case "
+#| "for embedded software and old releases &mdash; the users are sunk.  But "
+#| "if the developer does send a corrected version, it may contain new "
+#| "malicious functionalities as well as bug fixes."
 msgid ""
 "If the developer does not care to fix the problem &mdash; often the case for "
 "embedded software and old releases &mdash; the users are sunk.  But if the "
@@ -12379,19 +12429,6 @@
 "исправленную версию, в ней вместе с 
исправлениями ошибок могут быть новые "
 "вредоносные функции."
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Все сложные программы, как свободные, так 
и несвободные, содержат ошибки. "
-"Более опасными ошибки в несвободных 
программах делает то, что пользователи "
-"<em>беспомощны при необходимости исправить 
любые проблемы безопасности, "
-"которые возникают</em>. Именно то, что 
пользователей оставляют беспомощными, "
-"достойно порицания в несвободных 
программах."
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "
@@ -13516,6 +13553,97 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> Программа-шпион 
Pegasus применяла "
+#~ "уязвимости в несвободрых операционных 
системах смартфонов</a>, чтобы "
+#~ "навязывать людям слежку. Она может 
записывать переговоры людей, "
+#~ "копировать их сообщения, а также тайно 
делать видеозаписи с помощью "
+#~ "безщелчковой (т.е. взаимодействие с 
пользователем не требуется) "
+#~ "уязвимости."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "На этой странице перечисляются ясно 
установленные случаи уязвимости "
+#~ "несвободных программ, которые имели 
тяжкие последствия или примечательны "
+#~ "по другим причинам. Хотя большинство из 
этих прорех безопасности "
+#~ "непреднамеренны и таким образом не 
являются вредоносными в узком смысле, "
+#~ "мы сообщаем о них, чтобы показать, что 
несвободные программы не исключают "
+#~ "ошибки, и часто весьма грубые."
+
+#~ msgid ""
+#~ "The point of this page is not to imply that free software is immune to "
+#~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "
+#~ "too</em>, and is not secure as mainstream media may say."
+#~ msgstr ""
+#~ "Смысл этой страницы не в том, что 
свободные программы не подвержены "
+#~ "ошибкам или недочетам в защите; страница 
показывает, что <em>в "
+#~ "несвободных программах тоже есть 
ошибки</em>, и они не так защищены, как "
+#~ "могут говорить популярные средства 
массовой информации."
+
+#~ msgid ""
+#~ "Handling insecurities in free software is different from doing so in "
+#~ "proprietary programs. Free software users are able to study the program "
+#~ "and/or fix the bugs they find, often in communities as they are able to "
+#~ "share the program, while proprietary program users are forced to rely on "
+#~ "the program's developer for fixes."
+#~ msgstr ""
+#~ "Ошибки в защите свободных программ 
устраняются не так, как в несвободных "
+#~ "программах. Пользователи свободных 
программ могут изучать программу и "
+#~ "устранять ошибки, которые они найдут, 
часто в сообществах, поскольку они "
+#~ "могут обмениваться программой, в то 
время как пользователи несвободной "
+#~ "программы вынуждены полагаться в 
исправлениях на разработчика программы."
+
+#~ msgid ""
+#~ "If the developer does not care to fix the problem &mdash; often the case "
+#~ "for embedded software and old releases &mdash; the users are sunk.  But "
+#~ "if the developer does send a corrected version, it may contain new "
+#~ "malicious functionalities as well as bug fixes."
+#~ msgstr ""
+#~ "Если разработчик не позаботится об 
устранении проблемы&nbsp;&mdash; а "
+#~ "часто так и бывает в случае встроенных 
систем и старых выпусков&nbsp;"
+#~ "&mdash; пользователи ничего не могут 
поделать. Но если разработчик и "
+#~ "предоставляет исправленную версию, в 
ней вместе с исправлениями ошибок "
+#~ "могут быть новые вредоносные функции."
+
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Все сложные программы, как свободные, 
так и несвободные, содержат ошибки. "
+#~ "Более опасными ошибки в несвободных 
программах делает то, что "
+#~ "пользователи <em>беспомощны при необх
одимости исправить любые проблемы "
+#~ "безопасности, которые возникают</em>. 
Именно то, что пользователей "
+#~ "оставляют беспомощными, достойно 
порицания в несвободных программах."
+
+#~ msgid ""
 #~ "All complex programs, whether free or proprietary, contain bugs. What "
 #~ "makes bugs more dangerous in proprietary software is that users are "
 #~ "<em>helpless to fix any security problems that arise</em>.  Keeping the "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- tr.po       31 Jul 2021 07:32:19 -0000      1.209
+++ tr.po       31 Jul 2021 17:03:13 -0000      1.210
@@ -413,12 +413,19 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 "Kırıcılar, iAygıtlarında en son sürüm özel mülk işletim sistemi 
kurulu bile "
 "olsa, çoğu gazeteci olan insanların aygıtlarına <a 
href=\"https://www.xda-";
@@ -458,23 +465,20 @@
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 #| "surveillance on people. It can record people's calls, copy their "
 #| "messages, and secretly film them, using a zero-click (means no "
-#| "interaction is needed) and zero-day (means the bug was not found yet) "
-#| "vulnerabilities."
+#| "interaction is needed) vulnerability."
 msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 "Pegasus casus yazılımı, insanları gözetim altına almak için <a href="
 "\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-";
 "how-does-it-hack-phones\">özel mülk akıllı telefon işletim 
sistemlerindeki "
-"zaafları kullandı</a>. İnsanların çağrılarını okuyabiliyor, 
iletilerini "
-"kopyayabiliyor, ve gizlice onları filme alabiliyor, bunun için tıklama "
-"gerektirmeyen (yani etkileşime ihtiyaç duymayan) ve sıfır gün (bu 
hatanın "
-"henüz bulunamadığı anlamına geliyor) açıklarını kullanıyor."
+"açıkları kullandı</a>. İnsanların çağrılarını kaydedebiliyor, 
iletilerini "
+"kopyalabiliyor ve gizlice onları filme çekebiliyor, bunun için bir sıfır 
"
+"tıklama (yani etkileşime ihtiyaç duymayan) açığı kullanıyor."
 
 #. type: Content of: <div><ul><li><p>
 #, fuzzy
@@ -9586,20 +9590,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -9613,14 +9611,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "
@@ -10497,6 +10487,45 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Kırıcılar, iAygıtlarında en son sürüm özel mülk işletim sistemi 
kurulu "
+#~ "bile olsa, çoğu gazeteci olan insanların aygıtlarına <a 
href=\"https://";
+#~ "www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-"
+#~ "journalists/\">casus yazılım kurmak için, Apple iŞeyler'deki bir 
sıfır "
+#~ "gün açığını kullandılar</a>."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "Pegasus casus yazılımı, insanları gözetim altına almak için <a 
href="
+#~ "\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-";
+#~ "and-how-does-it-hack-phones\">özel mülk akıllı telefon işletim "
+#~ "sistemlerindeki zaafları kullandı</a>. İnsanların çağrılarını "
+#~ "okuyabiliyor, iletilerini kopyayabiliyor, ve gizlice onları filme "
+#~ "alabiliyor, bunun için tıklama gerektirmeyen (yani etkileşime ihtiyaç "
+#~ "duymayan) ve sıfır gün (bu hatanın henüz bulunamadığı anlamına 
geliyor) "
+#~ "açıklarını kullanıyor."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- zh-cn.po    31 Jul 2021 07:32:19 -0000      1.209
+++ zh-cn.po    31 Jul 2021 17:03:13 -0000      1.210
@@ -415,10 +415,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -446,8 +446,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -9188,20 +9187,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -9215,14 +9208,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- zh-tw.po    31 Jul 2021 07:32:19 -0000      1.332
+++ zh-tw.po    31 Jul 2021 17:03:13 -0000      1.333
@@ -440,10 +440,10 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -465,8 +465,7 @@
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
 "surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -8910,20 +8909,14 @@
 "software that has grave consequences or is otherwise noteworthy. Even though "
 "most of these security flaws are unintentional, thus are not malicious "
 "functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
 msgstr ""
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities.  "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
 "or fix the bugs they find, often in communities as they are able to share "
 "the program, while proprietary program users are forced to rely on the "
 "program's developer for fixes."
@@ -8937,14 +8930,6 @@
 "functionalities as well as bug fixes."
 msgstr ""
 
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "One of the dangers of the &ldquo;internet of stings&rdquo; is that, if you "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]