[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po all.fr.po all.pot all.pt-br....
From: |
GNUN |
Subject: |
www/proprietary/po all.fr.po all.pot all.pt-br.... |
Date: |
Sat, 31 Jul 2021 13:03:14 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/07/31 13:03:13
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po
es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.pt-br.po
malware-apple.ru.po malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.pt-br.po malware-google.ru.po
nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.475&r2=1.476
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.586&r2=1.587
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pt-br.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.331&r2=1.332
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.493&r2=1.494
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.520&r2=1.521
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.443&r2=1.444
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.539&r2=1.540
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.414&r2=1.415
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.696&r2=1.697
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.332&r2=1.333
Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- all.fr.po 31 Jul 2021 07:32:16 -0000 1.43
+++ all.fr.po 31 Jul 2021 17:03:10 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-30 18:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -79,12 +79,25 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -117,8 +130,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -133,8 +146,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- all.pot 31 Jul 2021 07:32:16 -0000 1.23
+++ all.pot 31 Jul 2021 17:03:10 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -76,10 +76,9 @@
msgid ""
"<a "
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -101,8 +100,7 @@
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- all.pt-br.po 31 Jul 2021 07:32:16 -0000 1.18
+++ all.pt-br.po 31 Jul 2021 17:03:10 -0000 1.19
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -80,12 +80,19 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -129,8 +136,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- all.ru.po 31 Jul 2021 08:31:02 -0000 1.42
+++ all.ru.po 31 Jul 2021 17:03:10 -0000 1.43
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -84,12 +85,25 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
@@ -119,13 +133,26 @@
"взломÑиков.</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- de.po 31 Jul 2021 07:32:16 -0000 1.332
+++ de.po 31 Jul 2021 17:03:10 -0000 1.333
@@ -663,10 +663,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -700,8 +700,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -13480,20 +13479,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -13507,14 +13500,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.475
retrieving revision 1.476
diff -u -b -r1.475 -r1.476
--- es.po 31 Jul 2021 07:32:17 -0000 1.475
+++ es.po 31 Jul 2021 17:03:10 -0000 1.476
@@ -617,10 +617,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -655,8 +655,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -14679,12 +14678,25 @@
msgstr "Censura en el software privativo"
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Esta página ofrece una lista de casos comprobados de inseguridad en el "
"software privativo con graves consecuencias o dignos de mención. Aun cuando "
@@ -14695,15 +14707,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -14717,26 +14723,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todo programa complejo, sea libre o privativo, contiene fallos. Lo que hace "
-"que los fallos sean más peligrosos en el software privativo es que los "
-"usuarios se ven <em>imposibilitados para subsanar cualquier problema de "
-"seguridad que surja</em>. El software privativo es culpable de mantener a "
-"los usuarios en la indefensión."
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
@@ -16013,6 +15999,38 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Esta página ofrece una lista de casos comprobados de inseguridad en el "
+#~ "software privativo con graves consecuencias o dignos de mención. Aun "
+#~ "cuando la mayor parte de estos fallos de seguridad no son intencionados, "
+#~ "de modo que en sentido estricto no son funcionalidades maliciosas, los "
+#~ "mencionamos aquà para mostrar que el software privativo no es inmune a "
+#~ "los fallos, y a menudo es bastante chapucero."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todo programa complejo, sea libre o privativo, contiene fallos. Lo que "
+#~ "hace que los fallos sean más peligrosos en el software privativo es que "
+#~ "los usuarios se ven <em>imposibilitados para subsanar cualquier problema "
+#~ "de seguridad que surja</em>. El software privativo es culpable de "
+#~ "mantener a los usuarios en la indefensión."
+
#, fuzzy
#~ msgid ""
#~ "All complex programs, whether free or proprietary, contain bugs. What "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.586
retrieving revision 1.587
diff -u -b -r1.586 -r1.587
--- fr.po 31 Jul 2021 07:32:17 -0000 1.586
+++ fr.po 31 Jul 2021 17:03:10 -0000 1.587
@@ -501,12 +501,25 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -539,8 +552,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -555,8 +568,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
@@ -12421,12 +12433,25 @@
msgstr "Insécurité du logiciel privateur"
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Cette page répertorie des failles de sécurité de logiciels privateurs, "
"failles clairement établies qui ont de graves conséquences ou méritent "
@@ -12438,15 +12463,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -12460,27 +12479,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Tous les programmes complexes, qu'ils soient libres ou privateurs, "
-"contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans le "
-"logiciel privateur est que <em>les utilisateurs n'ont pas la possibilité de "
-"corriger eux-mêmes les problèmes de sécurité qui pourraient
survenir</em>. "
-"C'est le fait de priver les utilisateurs de cette possibilité qui est "
-"coupable dans le logiciel privateur."
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
@@ -13607,6 +13605,78 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille "
+#~ "<i>zero-day</i> des iTrucs pour installer un logiciel espion</a>, sans "
+#~ "aucune action des utilisateurs (dont beaucoup étaient des journalistes), "
+#~ "et ceci même quand leur système d'exploitation était parfaitement Ã
jour."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise "
+#~ "des vulnérabilités des systèmes d'exploitation privateurs pour "
+#~ "smartphones</a> pour espionner les gens. Il peut enregistrer les appels, "
+#~ "copier les messages et filmer les gens secrètement, sans aucune "
+#~ "interaction de leur part, en utilisant une vulnérabilité <i>zero-day</i>
"
+#~ "(ce qui veut dire qu'elle n'a pas encore été divulguée)."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Cette page répertorie des failles de sécurité de logiciels privateurs, "
+#~ "failles clairement établies qui ont de graves conséquences ou méritent "
+#~ "d'être mentionnées pour d'autres raisons. Bien que la plupart de ces "
+#~ "failles soient involontaires, et donc ne constituent pas à proprement "
+#~ "parler des fonctionnalités malveillantes, nous les signalons pour montrer
"
+#~ "que le logiciel privateur n'est pas exempt de bogues et qu'il est souvent "
+#~ "tout à fait bâclé."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Tous les programmes complexes, qu'ils soient libres ou privateurs, "
+#~ "contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans "
+#~ "le logiciel privateur est que <em>les utilisateurs n'ont pas la "
+#~ "possibilité de corriger eux-mêmes les problèmes de sécurité qui "
+#~ "pourraient survenir</em>. C'est le fait de priver les utilisateurs de "
+#~ "cette possibilité qui est coupable dans le logiciel privateur."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- it.po 31 Jul 2021 07:32:17 -0000 1.332
+++ it.po 31 Jul 2021 17:03:10 -0000 1.333
@@ -629,10 +629,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -654,8 +654,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -12602,20 +12601,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -12629,14 +12622,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- ja.po 31 Jul 2021 07:32:17 -0000 1.340
+++ ja.po 31 Jul 2021 17:03:11 -0000 1.341
@@ -472,10 +472,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -497,8 +497,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -10253,20 +10252,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -10280,14 +10273,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- malware-apple.de-diff.html 31 Jul 2021 07:32:17 -0000 1.78
+++ malware-apple.de-diff.html 31 Jul 2021 17:03:11 -0000 1.79
@@ -312,7 +312,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -335,7 +335,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -485,9 +485,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2008-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
- iOS, the operating system of the Apple iThings, is the
prototype</em></ins></span>
- of <span class="inserted"><ins><em>a jail</a>. It was Apple that
introduced the practice of
- designing general purpose computers with censorship of application
+ iOS, the operating system of the Apple iThings, is the prototype
+ of a jail</a>. It was Apple that introduced the
practice</em></ins></span> of
+ <span class="inserted"><ins><em>designing general purpose computers with
censorship of application
programs.</p>
<p>Here is an article about the <a
@@ -1321,8 +1321,8 @@
<p>Curiously,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the
-<span class="removed"><del><strong>walls of the iThing jail: users can now
install apps built from
+ Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through the
+walls of</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the <span
class="removed"><del><strong>iThing jail: users can now install apps built from
source code, provided</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>source code is written in Swift. Users
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
@@ -1561,7 +1561,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- malware-apple.de.po 31 Jul 2021 07:32:17 -0000 1.169
+++ malware-apple.de.po 31 Jul 2021 17:03:11 -0000 1.170
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -536,10 +536,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -573,8 +573,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- malware-apple.es.po 31 Jul 2021 07:32:17 -0000 1.218
+++ malware-apple.es.po 31 Jul 2021 17:03:11 -0000 1.219
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -412,10 +412,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -450,8 +450,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- malware-apple.fr.po 31 Jul 2021 07:32:17 -0000 1.222
+++ malware-apple.fr.po 31 Jul 2021 17:03:11 -0000 1.223
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-30 18:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -407,12 +407,25 @@
"que les logiciels privateurs prestigieux n'ont pas de bogue grave."
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -445,8 +458,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -461,8 +474,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-apple.it-diff.html 31 Jul 2021 07:32:17 -0000 1.83
+++ malware-apple.it-diff.html 31 Jul 2021 17:03:11 -0000 1.84
@@ -310,7 +310,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -333,7 +333,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -357,8 +357,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple</em></ins></span> has <span class="inserted"><ins><em><a
-
href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented</em></ins></span>
- a <span class="inserted"><ins><em>malware in its computers that imposes
surveillance</a> on users
+
href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
<p>The reports are even unencrypted and they've been leaking this
@@ -387,8 +387,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to render a
- certain kind of image file</a>.</p>
+ malicious code from any application which uses this API to
render</em></ins></span> a
+ <span class="inserted"><ins><em>certain kind of image
file</a>.</p>
</li>
<li id="M201604120">
@@ -1499,7 +1499,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- malware-apple.it.po 31 Jul 2021 07:32:17 -0000 1.162
+++ malware-apple.it.po 31 Jul 2021 17:03:11 -0000 1.163
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,10 +486,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -511,8 +511,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- malware-apple.ja-diff.html 31 Jul 2021 07:32:17 -0000 1.98
+++ malware-apple.ja-diff.html 31 Jul 2021 17:03:11 -0000 1.99
@@ -126,9 +126,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do with the data in their
computers.</li>
-<li><a
href="#jails">Jails</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>impose censorship on application
programs.</li>
-<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system</strong></del></span> <span
class="inserted"><ins><em><a
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>reject any operating system</strong></del></span>
<span class="inserted"><ins><em><a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
@@ -344,7 +344,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
+ used an exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
After</strong></del></span> <span class="inserted"><ins><em>iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>latest version of the proprietary operating
@@ -368,7 +368,7 @@
The pegasus spyware used vulnerabilities</em></ins></span> on <span
class="inserted"><ins><em>proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to
fix</em></ins></span> the <span class="removed"><del><strong>subject
matter</a>.
</p></li>
@@ -731,12 +731,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -749,12 +749,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p>
+ to actually turn it off.</p></em></ins></span>
</li>
</ul>
-<h3 id="pressuring">Pressuring</h3></em></ins></span>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -1021,8 +1021,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
@@ -1061,8 +1061,8 @@
<li id="M201809070">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -1464,7 +1464,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:17 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-apple.ja.po 31 Jul 2021 07:32:17 -0000 1.145
+++ malware-apple.ja.po 31 Jul 2021 17:03:11 -0000 1.146
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -406,10 +406,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -431,8 +431,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-apple.nl-diff.html 31 Jul 2021 07:32:18 -0000 1.101
+++ malware-apple.nl-diff.html 31 Jul 2021 17:03:11 -0000 1.102
@@ -126,9 +126,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do with the data in their
computers.</li>
-<li><a
href="#jails">Jails</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>impose censorship on application
programs.</li>
-<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system</strong></del></span> <span
class="inserted"><ins><em><a
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>reject any operating system</strong></del></span>
<span class="inserted"><ins><em><a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
@@ -344,7 +344,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
+ used an exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
After</strong></del></span> <span class="inserted"><ins><em>iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>latest version of the proprietary operating
@@ -368,7 +368,7 @@
The pegasus spyware used vulnerabilities</em></ins></span> on <span
class="inserted"><ins><em>proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to
fix</em></ins></span> the <span class="removed"><del><strong>subject
matter</a>.
</p></li>
@@ -731,12 +731,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -749,12 +749,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p>
+ to actually turn it off.</p></em></ins></span>
</li>
</ul>
-<h3 id="pressuring">Pressuring</h3></em></ins></span>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -1021,8 +1021,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
@@ -1061,8 +1061,8 @@
<li id="M201809070">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -1464,7 +1464,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-apple.nl.po 31 Jul 2021 07:32:18 -0000 1.99
+++ malware-apple.nl.po 31 Jul 2021 17:03:11 -0000 1.100
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -424,10 +424,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -449,8 +449,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-apple.pot 31 Jul 2021 07:32:18 -0000 1.109
+++ malware-apple.pot 31 Jul 2021 17:03:11 -0000 1.110
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -316,10 +316,9 @@
msgid ""
"<a "
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -341,8 +340,7 @@
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.pt-br.po 31 Jul 2021 07:32:18 -0000 1.5
+++ malware-apple.pt-br.po 31 Jul 2021 17:03:11 -0000 1.6
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -402,12 +402,19 @@
"graves."
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -451,8 +458,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- malware-apple.ru.po 31 Jul 2021 08:31:02 -0000 1.271
+++ malware-apple.ru.po 31 Jul 2021 17:03:11 -0000 1.272
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -404,12 +405,25 @@
"пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок."
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
@@ -439,13 +453,26 @@
"взломÑиков.</small>"
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-google.de-diff.html 31 Jul 2021 07:32:18 -0000 1.70
+++ malware-google.de-diff.html 31 Jul 2021 17:03:11 -0000 1.71
@@ -319,7 +319,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -496,7 +496,7 @@
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
collecting user's personal and identifiable data</a> including how
long
a call lasts, who's participating in the call, and the IP addresses
- of everyone taking part. From experience, this can even harm users
+ of everyone taking part. From experience, this</em></ins></span> can <span
class="inserted"><ins><em>even harm users
physically if those companies hand over data to governments.</p>
</li>
@@ -505,8 +505,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google, Apple, and Microsoft (and probably some other companies)
<a
href="https://www.lifewire.com/wifi-positioning-system-1683343">are
- collecting people's access points and GPS coordinates
(which</em></ins></span> can
- <span class="inserted"><ins><em>identify people's precise location) even
if their GPS is turned
+ collecting people's access points and GPS coordinates (which can
+ identify people's precise location) even if their GPS is turned
off</a>, without the person's consent, using proprietary software
implemented in person's smartphone. Though merely asking for permission
would not necessarily legitimize this.</p>
@@ -587,11 +587,11 @@
<li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses
run</em></ins></span>
- by <span class="removed"><del><strong>noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Google, Twitter and three other companies are facing
a lawsuit <a
+ <p>Tiny Lab Productions, along with online ad businesses run
+ by Google, Twitter and three other companies are facing a lawsuit <a
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
+ violating people's privacy</em></ins></span> by <span
class="removed"><del><strong>noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>collecting their data from mobile games
and handing over these data to other
companies/advertisers</a>.</p>
</li>
@@ -714,21 +714,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="nest-thermometers">Nest thermometers</em></ins></span> send
<span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em><a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
- data <span class="removed"><del><strong>to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>about the user</a>.</p>
+ data <span class="removed"><del><strong>to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>about the user</a>.</p></em></ins></span>
</li>
- <li id="M201308040">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308040">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google Chrome <a
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
- software.</p></em></ins></span>
+ software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
+ <li id="M201308010">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
@@ -922,7 +922,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-google.de.po 31 Jul 2021 07:32:18 -0000 1.80
+++ malware-google.de.po 31 Jul 2021 17:03:11 -0000 1.81
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -554,8 +554,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-google.es.po 31 Jul 2021 07:32:18 -0000 1.94
+++ malware-google.es.po 31 Jul 2021 17:03:11 -0000 1.95
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-08 11:03+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -416,8 +416,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-google.fr.po 31 Jul 2021 07:32:18 -0000 1.140
+++ malware-google.fr.po 31 Jul 2021 17:03:11 -0000 1.141
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-30 18:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -412,8 +412,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -428,8 +428,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- malware-google.pot 31 Jul 2021 07:32:18 -0000 1.74
+++ malware-google.pot 31 Jul 2021 17:03:11 -0000 1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -313,8 +313,7 @@
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-google.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pt-br.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-google.pt-br.po 31 Jul 2021 07:32:18 -0000 1.10
+++ malware-google.pt-br.po 31 Jul 2021 17:03:11 -0000 1.11
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -418,8 +418,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-google.ru.po 31 Jul 2021 08:31:02 -0000 1.154
+++ malware-google.ru.po 31 Jul 2021 17:03:11 -0000 1.155
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -408,13 +409,26 @@
"пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок."
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- nl.po 31 Jul 2021 07:32:18 -0000 1.333
+++ nl.po 31 Jul 2021 17:03:11 -0000 1.334
@@ -450,10 +450,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -475,8 +475,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -9553,20 +9552,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -9580,14 +9573,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- pl.po 31 Jul 2021 07:32:18 -0000 1.332
+++ pl.po 31 Jul 2021 17:03:11 -0000 1.333
@@ -439,10 +439,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -464,8 +464,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -9034,20 +9033,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -9061,14 +9054,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.331
retrieving revision 1.332
diff -u -b -r1.331 -r1.332
--- pot 31 Jul 2021 07:32:18 -0000 1.331
+++ pot 31 Jul 2021 17:03:11 -0000 1.332
@@ -369,10 +369,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -394,8 +394,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8309,20 +8308,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -8336,14 +8329,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-insecurity.de-diff.html 31 Jul 2021 07:32:18 -0000 1.86
+++ proprietary-insecurity.de-diff.html 31 Jul 2021 17:03:11 -0000 1.87
@@ -62,50 +62,36 @@
</div>
<div class="article">
-<p>This</em></ins></span> page lists clearly established cases of
insecurity in
-proprietary software that has grave consequences or is otherwise
+<p>This</em></ins></span> page lists clearly established cases of
insecurity in proprietary
+software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
-<p>It is incorrect to compare free software with a fictitious
idea</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most</em></ins></span>
of
-<span class="removed"><del><strong>proprietary software as perfect, but the
press often implicitly does
-that whenever a</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> security <span
class="removed"><del><strong>hole</strong></del></span> <span
class="inserted"><ins><em>flaws are unintentional,
-thus are not malicious functionalities</em></ins></span> in a <span
class="removed"><del><strong>free program is discovered. The
-examples below</strong></del></span> <span class="inserted"><ins><em>strict
sense, we report
-them to</em></ins></span> show that proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>is not immune to bugs,</em></ins></span> and is
- often quite sloppy.</p>
-
-<span class="removed"><del><strong><p>It would be equally
incorrect</strong></del></span>
-
-<span class="inserted"><ins><em><p>The point of this page is
not</em></ins></span> to <span class="removed"><del><strong>compare
proprietary</strong></del></span> <span class="inserted"><ins><em>imply that
free</em></ins></span> software <span class="removed"><del><strong>with
-a fictitious idea of</strong></del></span> <span class="inserted"><ins><em>is
immune to
-bugs or insecurities; it's to show that <em>proprietary software has bugs
- too</em>, and is not secure as mainstream media may say.</p>
-
-<p>Handling insecurities in</em></ins></span> free software <span
class="inserted"><ins><em>is different from doing so in proprietary
-programs. Free software users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial</strong></del></span>
<span class="inserted"><ins><em>they are able to share the
-program, while proprietary</em></ins></span> program <span
class="removed"><del><strong>has bugs,</strong></del></span> <span
class="inserted"><ins><em>users are forced to rely on the
- program's developer for fixes.</p>
-
-<p>If the developer does not care to fix the problem — often
-the case for embedded software</em></ins></span> and <span
class="removed"><del><strong>any system,</strong></del></span> <span
class="inserted"><ins><em>old releases — the users
-are sunk. But if the developer does send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.</p>
-
-<p>All complex programs, whether</em></ins></span> free or proprietary,
<span class="removed"><del><strong>may have
-security errors. To err is human, and not culpable.
But</strong></del></span> <span class="inserted"><ins><em>contain bugs. What
-makes bugs more dangerous in</em></ins></span> proprietary software <span
class="removed"><del><strong>developers frequently disregard gaping holes, or
even
-introduce them deliberately. In any case, they keep</strong></del></span>
<span class="inserted"><ins><em>is that</em></ins></span> users <span
class="inserted"><ins><em>are</em></ins></span>
-<em>helpless to fix any security problems that arise</em>. Keeping
-the users helpless is what's culpable about proprietary software.</p>
+<p>It</strong></del></span> <span class="inserted"><ins><em>noteworthy.
Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them to show that
+proprietary software is not as secure as mainstream media may say.</p>
+
+<p>This doesn't imply that free software</em></ins></span> is <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>immune</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs or insecurities.
+The difference between</em></ins></span> free <span
class="inserted"><ins><em>and proprietary</em></ins></span> software <span
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span
class="inserted"><ins><em>in this respect is
+the handling</em></ins></span> of
+<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
+able to share the program, while proprietary program users are forced to
+rely on the program's developer for fixes.</p>
+
+
+<p>If</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
+embedded software and old releases — the users are sunk. But if the
+developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
+functionalities as well as bug fixes.</p>
-<span class="inserted"><ins><em><div class="important"></em></ins></span>
-<p>If you know of an example that ought to be in this page but isn't
+
+<div class="important">
+<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
+to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
@@ -116,18 +102,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
- if they were using</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>latest
version of the proprietary operating
+ if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
<p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
+ have to wait until Apple fixes these</em></ins></span> security <span
class="inserted"><ins><em>holes, if it decides
+ to fix it. A free operating system would let people to identify
the</em></ins></span>
+ hole <span class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>and fix it.</p>
<p><small>Please note that the article
wrongly refers to crackers as “<a
@@ -141,10 +124,10 @@
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
- people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ people's calls, copy their messages, and secretly film them,
using</em></ins></span> a
+ <span class="inserted"><ins><em>security vulnerability.</p>
- <p>A free operating system would've let people to fix the bugs for
+ <p>A</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>operating system would've let people to fix the bugs
for
themselves but now infected people are forced to wait for corporations to
fix the problems.</p>
@@ -185,8 +168,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
- is moving its Chinese customers' iCloud data to a datacenter controlled
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple</em></ins></span>
+ is <span class="removed"><del><strong>discovered.</strong></del></span>
<span class="inserted"><ins><em>moving its Chinese customers' iCloud data to a
datacenter controlled
by the Chinese government</a>. Apple is already storing the
encryption
keys on these servers, obeying Chinese authority, making all Chinese
user data available to the government.</p>
@@ -225,8 +208,9 @@
<p>A zero-day vulnerability in Zoom which <a
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
be used to launch remote code execution (RCE) attacks</a> has been
- disclosed by researchers. The researchers demonstrated a three-bug
- attack chain that caused an RCE on a target machine, all this without
+ disclosed by researchers.</em></ins></span> The
+<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>researchers demonstrated a three-bug
+ attack chain</em></ins></span> that <span class="inserted"><ins><em>caused
an RCE on a target machine, all this without
any form of user interaction.</p>
</li>
@@ -234,14 +218,16 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
+ company's</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by a major security
breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
+ gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
Verkada's cameras.</p>
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
+ <p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
+
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
+ to the public</a> for gyms, stores, hospitals, jails, and
schools</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span>
+ <span class="inserted"><ins><em>hand “security” footage to a
company from which the government can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
@@ -256,19 +242,19 @@
in the United States are newly “<a
href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
+ in Microsoft's</em></ins></span> proprietary <span
class="removed"><del><strong>software</strong></del></span> <span
class="inserted"><ins><em>email software, named Microsoft 365</a>. It
is unclear whether there are other holes and vulnerabilities in the
program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
+ the last disaster</em></ins></span> with <span
class="inserted"><ins><em>proprietary programs.</p>
</li>
<li id="M202102110">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Researchers at the security firm SentinelOne discovered a <a
+ <p>Researchers at the security firm SentinelOne
discovered</em></ins></span> a <span class="removed"><del><strong>fictitious
idea of</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
flaw in proprietary program Microsoft Windows Defender that lurked
- undetected for 12 years</a>. If the program was free (as in freedom),
+ undetected for 12 years</a>. If the program was</em></ins></span>
free <span class="inserted"><ins><em>(as in freedom),
more people would have had a chance to notice the problem, therefore,
it could've been fixed a lot sooner.</p>
</li>
@@ -318,11 +304,12 @@
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
code was sneaked into SolarWinds' proprietary software named
Orion</a>. Crackers got access to networks when users downloaded
- a tainted software update. Crackers were able to monitor internal
+ a tainted</em></ins></span> software <span
class="inserted"><ins><em>update. Crackers were able to monitor internal
emails at some of the top agencies in the US.</p>
<p><small>(Please note that the article
- wrongly refers to crackers as "<a
+ wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
+program has bugs,</strong></del></span> <span class="inserted"><ins><em>"<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
@@ -332,10 +319,10 @@
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
caught collecting sensitive personal data</a> that can be used for
- lifetime tracking of users, and putting them in danger. More than 1.4
+ lifetime tracking of users,</em></ins></span> and <span
class="removed"><del><strong>any system, free or
proprietary,</strong></del></span> <span class="inserted"><ins><em>putting them
in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
users' privacy is jeopardized by this surveillance tool. Data collected
- by Baidu may be handed over to the Chinese government, possibly
+ by Baidu</em></ins></span> may <span
class="removed"><del><strong>have</strong></del></span> <span
class="inserted"><ins><em>be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -376,7 +363,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
+ A disasterous</em></ins></span> security <span
class="removed"><del><strong>errors. To err</strong></del></span> <span
class="inserted"><ins><em>bug</a> touches millions of products in the
Internet of Stings.</p>
<p>As a result, anyone can sting the user, not only the
@@ -396,7 +383,7 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat is malware; <a
+ <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="removed"><del><strong>human,</strong></del></span> <span
class="inserted"><ins><em>malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
on system boot at kernel level</a> on Windows. It is insecure
software
that increases the attack surface of the operating system.</p>
@@ -409,7 +396,7 @@
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
managed to interfere the Amazon Ring proprietary system, and <a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers and microphones</a>.</p>
+ its camera, speakers</em></ins></span> and <span
class="inserted"><ins><em>microphones</a>.</p>
</li>
<li id="M201911190">
@@ -421,10 +408,11 @@
access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
+ <p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used by their
+ security, including encryption.</em></ins></span> But <span
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
+ software <span class="removed"><del><strong>developers frequently
disregard gaping holes, or even
+introduce them deliberately. In any case,</strong></del></span> <span
class="inserted"><ins><em>lack this. Of course,</em></ins></span> they <span
class="removed"><del><strong>keep</strong></del></span> <span
class="inserted"><ins><em>are also used by their
manufacturers for snooping.</p>
</li>
@@ -438,22 +426,26 @@
the user's iMonster</a>.</p>
<p>The deep insecurity of iMonsters is even more pertinent given that
- Apple's proprietary software makes users totally dependent on Apple
+ Apple's proprietary software makes</em></ins></span> users
+<span class="removed"><del><strong><em>helpless</strong></del></span>
<span class="inserted"><ins><em>totally dependent on Apple
for even a modicum of security. It also means that the devices do
- not even try to offer security against Apple itself.</p>
+ not even try</em></ins></span> to <span class="removed"><del><strong>fix
any</strong></del></span> <span
class="inserted"><ins><em>offer</em></ins></span> security <span
class="removed"><del><strong>problems</strong></del></span> <span
class="inserted"><ins><em>against Apple itself.</p>
</li>
<li id="M201908020">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Out of 21 gratis Android antivirus apps
- that were tested by security researchers, eight <a
+ <p>Out of 21 gratis Android antivirus apps</em></ins></span>
+ that <span class="removed"><del><strong>arise</em>.
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by
security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
failed to detect a test virus</a>. All of them asked for dangerous
permissions or contained advertising trackers, with seven being more
- risky than the average of the 100 most popular Android apps.</p>
+ risky than</em></ins></span> the
+<span class="removed"><del><strong>users helpless is what's culpable
about</strong></del></span> <span class="inserted"><ins><em>average of the 100
most popular Android apps.</p>
+
+ <p><small>(Note that the article refers to
these</em></ins></span> proprietary <span
class="removed"><del><strong>software.</p>
- <p><small>(Note that the article refers to these proprietary
apps as
+<p>If you know</strong></del></span> <span
class="inserted"><ins><em>apps as
“free”. It should have said “gratis”
instead.)</small></p>
</li>
@@ -473,7 +465,7 @@
<li id="M201905150">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Users caught in the jail of an iMonster are <a
+ <p>Users caught in the jail</em></ins></span> of an <span
class="removed"><del><strong>example</strong></del></span> <span
class="inserted"><ins><em>iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
@@ -487,14 +479,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
+ two vulnerabilities</em></ins></span> that <span
class="removed"><del><strong>ought</strong></del></span> <span
class="inserted"><ins><em>affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
+ protocol in 2008. Apparently, nothing was done by the
company</em></ins></span> to <span
class="removed"><del><strong>be</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
+ developers to fix bugs</em></ins></span> in <span
class="removed"><del><strong>this page but isn't
+here, please write</strong></del></span> <span class="inserted"><ins><em>their
products.</p>
</li>
<li id="M201902270">
@@ -508,9 +501,9 @@
<p>The third party vulnerability is presumably
unintentional and Amazon will probably fix it. However, we
- do not expect Amazon to change the design that <a
- href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p>
+ do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change the design that</em></ins></span> <a <span
class="removed"><del><strong>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon</em></ins></span> to <span class="removed"><del><strong>inform us.
Please include</strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p>
</li>
<li id="M201809240">
@@ -525,9 +518,9 @@
<li id="M201808130">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Since the beginning of 2017, <a
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>URL</strong></del></span> <span
class="inserted"><ins><em>beginning of 2017, <a
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android
- phones have been collecting the addresses of nearby cellular
+ phones have been collecting the addresses</em></ins></span> of <span
class="inserted"><ins><em>nearby cellular
towers</a>, even when location services are disabled, and sending
that data back to Google.</p>
</li>
@@ -535,13 +528,16 @@
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>trustworthy reference</strong></del></span> <span
class="inserted"><ins><em>way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
+ easier for Amazon. And if some government such as China</em></ins></span>
or <span class="removed"><del><strong>two</strong></del></span> <span
class="inserted"><ins><em>the US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>product in
that country,
do you think Amazon would have the moral fiber to say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
@@ -1219,17 +1215,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1321,12 +1317,10 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1339,10 +1333,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1526,7 +1522,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary-insecurity.de.po 31 Jul 2021 07:32:18 -0000 1.184
+++ proprietary-insecurity.de.po 31 Jul 2021 17:03:11 -0000 1.185
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -128,20 +128,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -155,14 +149,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><div><p>
# | If you know of an example that ought to be in this page but isn't here,
# | please write to <a
@@ -190,10 +176,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -227,8 +213,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-insecurity.es.po 31 Jul 2021 07:32:18 -0000 1.116
+++ proprietary-insecurity.es.po 31 Jul 2021 17:03:11 -0000 1.117
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -85,12 +85,25 @@
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Esta página ofrece una lista de casos comprobados de inseguridad en el "
"software privativo con graves consecuencias o dignos de mención. Aun cuando "
@@ -101,15 +114,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -123,26 +130,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todo programa complejo, sea libre o privativo, contiene fallos. Lo que hace "
-"que los fallos sean más peligrosos en el software privativo es que los "
-"usuarios se ven <em>imposibilitados para subsanar cualquier problema de "
-"seguridad que surja</em>. El software privativo es culpable de mantener a "
-"los usuarios en la indefensión."
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -158,10 +145,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -186,8 +173,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -1827,3 +1813,21 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todo programa complejo, sea libre o privativo, contiene fallos. Lo que "
+#~ "hace que los fallos sean más peligrosos en el software privativo es que "
+#~ "los usuarios se ven <em>imposibilitados para subsanar cualquier problema "
+#~ "de seguridad que surja</em>. El software privativo es culpable de "
+#~ "mantener a los usuarios en la indefensión."
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary-insecurity.fr.po 31 Jul 2021 07:32:18 -0000 1.266
+++ proprietary-insecurity.fr.po 31 Jul 2021 17:03:12 -0000 1.267
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-30 18:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -82,12 +82,25 @@
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Cette page répertorie des failles de sécurité de logiciels privateurs, "
"failles clairement établies qui ont de graves conséquences ou méritent "
@@ -99,15 +112,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -121,27 +128,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Tous les programmes complexes, qu'ils soient libres ou privateurs, "
-"contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans le "
-"logiciel privateur est que <em>les utilisateurs n'ont pas la possibilité de "
-"corriger eux-mêmes les problèmes de sécurité qui pourraient
survenir</em>. "
-"C'est le fait de priver les utilisateurs de cette possibilité qui est "
-"coupable dans le logiciel privateur."
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -156,12 +142,25 @@
"pour l'étayer."
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -194,8 +193,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -210,8 +209,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
@@ -1866,3 +1864,22 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Tous les programmes complexes, qu'ils soient libres ou privateurs, "
+#~ "contiennent des bogues. Ce qui rend ces dernières plus dangereuses dans "
+#~ "le logiciel privateur est que <em>les utilisateurs n'ont pas la "
+#~ "possibilité de corriger eux-mêmes les problèmes de sécurité qui "
+#~ "pourraient survenir</em>. C'est le fait de priver les utilisateurs de "
+#~ "cette possibilité qui est coupable dans le logiciel privateur."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-insecurity.it-diff.html 31 Jul 2021 07:32:18 -0000 1.99
+++ proprietary-insecurity.it-diff.html 31 Jul 2021 17:03:12 -0000 1.100
@@ -62,41 +62,35 @@
</div>
<div class="article">
-<p>This</em></ins></span> page lists clearly established cases of
insecurity in
-proprietary software that has grave consequences or is otherwise
+<p>This</em></ins></span> page lists clearly established cases of
insecurity in proprietary
+software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
-<p>It</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most of these security
flaws are unintentional,
-thus are not malicious functionalities in a strict sense, we report
-them to show that proprietary software</em></ins></span> is <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>not immune</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs, and is
- often quite sloppy.</p>
-
-<p>The point of this page is not to imply that</em></ins></span> free
software <span class="removed"><del><strong>with a fictitious idea
of</strong></del></span> <span class="inserted"><ins><em>is immune to
-bugs or insecurities; it's to show that <em>proprietary software has bugs
- too</em>, and is not secure as mainstream media may say.</p>
-
-<p>Handling insecurities in free software is different from doing so
in</em></ins></span> proprietary
-<span class="inserted"><ins><em>programs. Free</em></ins></span> software
<span class="inserted"><ins><em>users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span
class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are able to share the
-program, while proprietary program users are forced to rely
on</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span>
- <span class="inserted"><ins><em>program's developer for fixes.</p>
-
-<p>If the developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span>
-<span class="inserted"><ins><em>the case for embedded software and old
releases — the users
-are sunk. But if the developer</em></ins></span> does <span
class="inserted"><ins><em>send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.</p>
-
-<p>All complex programs, whether free or proprietary, contain bugs. What
-makes bugs more dangerous in proprietary software is</em></ins></span> that
<span class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>users are
-<em>helpless to fix any security problems that arise</em>. Keeping
-the users helpless is what's culpable about proprietary software.</p>
+<p>It</strong></del></span> <span class="inserted"><ins><em>noteworthy.
Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them to show that
+proprietary software is not as secure as mainstream media may say.</p>
+
+<p>This doesn't imply that free software</em></ins></span> is <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>immune</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs or insecurities.
+The difference between</em></ins></span> free <span
class="inserted"><ins><em>and proprietary</em></ins></span> software <span
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span
class="inserted"><ins><em>in this respect is
+the handling</em></ins></span> of
+<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
+able to share</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>program, while proprietary program users are forced to
+rely on the program's developer for fixes.</p>
+
+
+<p>If the developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
+embedded software and old releases — the users are sunk. But if the
+developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
+functionalities as well as bug fixes.</p>
+
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
+<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -108,7 +102,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used</em></ins></span> a <span class="inserted"><ins><em>zero-day and
zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -131,7 +125,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them,
using</em></ins></span> a
- <span class="inserted"><ins><em>zero-click (means no interaction is
needed) vulnerability.</p>
+ <span class="inserted"><ins><em>security vulnerability.</p>
<p>A</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>operating system would've let people to fix the bugs
for
themselves but now infected people are forced to wait for corporations to
@@ -191,7 +185,7 @@
the payments don't go through</a>.</p>
<p>They say there is a 30-days grace period if you miss a payment
- but the grace period</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>no excuse to the insecurity.</p>
+ but the grace period is no excuse to the insecurity.</p>
</li>
<li id="M202105030">
@@ -202,7 +196,7 @@
up with private companies to monitor American citizens' private online
activity and digital communications</a>.</p>
- <p>What creates the opportunity to try this is the fact that these
+ <p>What creates the opportunity to try this</em></ins></span> is
<span class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>the fact that these
companies are already snooping on users' private activities. That
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
@@ -231,9 +225,9 @@
<p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
-<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span>
- to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>the public</a> for gyms, stores, hospitals,
jails, and schools to
- hand “security” footage to a company from which the government
can
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
+ to the public</a> for gyms, stores, hospitals, jails, and schools to
+ hand “security” footage</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>a company from which the government can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
@@ -400,7 +394,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some security breakers (wrongly referred in this article as <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
+ managed to interfere the Amazon Ring proprietary system,</em></ins></span>
and <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
@@ -411,7 +405,7 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
@@ -553,7 +547,7 @@
<li id="M201807100">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Siri, Alexa,</em></ins></span> and <span
class="inserted"><ins><em>all the other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -573,7 +567,7 @@
<p>One of the dangers of the “internet of stings”
is that, if you lose your internet service, you also <a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
+ lose control of your house</em></ins></span> and <span
class="inserted"><ins><em>appliances</a>.</p>
<p>For your safety, don't</em></ins></span> use <span
class="inserted"><ins><em>any appliance with a connection to the
real internet.</p>
@@ -1104,19 +1098,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1237,8 +1231,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -1295,20 +1289,20 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402210">
+ <li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1501,7 +1495,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary-insecurity.it.po 31 Jul 2021 07:32:18 -0000 1.201
+++ proprietary-insecurity.it.po 31 Jul 2021 17:03:12 -0000 1.202
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -123,20 +123,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -150,14 +144,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><div><p>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
@@ -180,10 +166,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -205,8 +191,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-insecurity.ja-diff.html 31 Jul 2021 07:32:18 -0000 1.120
+++ proprietary-insecurity.ja-diff.html 31 Jul 2021 17:03:12 -0000 1.121
@@ -62,37 +62,29 @@
</div>
<div class="article">
-<p>This</em></ins></span> page lists clearly established cases of
insecurity in
-proprietary software that has grave consequences or is otherwise
+<p>This</em></ins></span> page lists clearly established cases of
insecurity in proprietary
+software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
-<p>It would be incorrect</strong></del></span>
-<span class="inserted"><ins><em>noteworthy. Even though most of these security
flaws are unintentional,
-thus are not malicious functionalities in a strict sense, we report
-them</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>show that</em></ins></span> proprietary software
<span class="removed"><del><strong>with a
-fictitious idea</strong></del></span> <span class="inserted"><ins><em>is not
immune to bugs, and is
- often quite sloppy.</p>
-
-<p>The point</em></ins></span> of <span class="inserted"><ins><em>this
page is not to imply that</em></ins></span> free software <span
class="inserted"><ins><em>is immune to
-bugs or insecurities; it's to show that <em>proprietary software has bugs
- too</em>, and is not secure as mainstream media may say.</p>
-
-<p>Handling insecurities in free software is different from doing so in
proprietary
-programs. Free software users are able to study the program and/or fix
-the bugs they find, often in communities</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial</strong></del></span>
<span class="inserted"><ins><em>they are able to share the
-program, while proprietary</em></ins></span> program
-<span class="removed"><del><strong>has bugs,</strong></del></span> <span
class="inserted"><ins><em>users are forced to rely on the
- program's developer for fixes.</p>
-
-<p>If the developer does not care to fix the problem — often
-the case for embedded software</em></ins></span> and <span
class="removed"><del><strong>any system,</strong></del></span> <span
class="inserted"><ins><em>old releases — the users
-are sunk. But if the developer does send a corrected version,
-it may contain new malicious functionalities as well as bug fixes.</p>
-
-<p>All complex programs, whether</em></ins></span> free or proprietary,
<span class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>contain bugs. What
-makes bugs more dangerous in proprietary software is that users are
-<em>helpless to fix any security problems that arise</em>. Keeping
-the users helpless is what's culpable about proprietary software.</p>
+<p>It would be incorrect</strong></del></span> <span
class="inserted"><ins><em>noteworthy. Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them</em></ins></span>
to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>show that</em></ins></span>
+proprietary software <span class="removed"><del><strong>with a
+fictitious idea</strong></del></span> <span class="inserted"><ins><em>is not
as secure as mainstream media may say.</p>
+
+<p>This doesn't imply that free software is immune to bugs or
insecurities.
+The difference between free and proprietary software in this respect is
+the handling</em></ins></span> of <span class="inserted"><ins><em>the
bugs:</em></ins></span> free software <span class="inserted"><ins><em>users are
able to study the
+program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect. Every
nontrivial</strong></del></span> <span class="inserted"><ins><em>they are
+able to share the program, while proprietary</em></ins></span> program <span
class="inserted"><ins><em>users are forced to
+rely on the program's developer for fixes.</p>
+
+
+<p>If the developer does not care to fix the problem — often the
case for
+embedded software and old releases — the users are sunk. But if the
+developer does send a corrected version, it may contain new malicious
+functionalities as well as bug fixes.</p>
+
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -110,14 +102,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
- <p>Nobody can do anything about these vulnerabilities and
people</em></ins></span>
- have <span class="inserted"><ins><em>to wait until Apple fixes
these</em></ins></span> security
-<span class="removed"><del><strong>holes.</strong></del></span> <span
class="inserted"><ins><em>holes, if it decides
+ <p>Nobody can do anything about these vulnerabilities and people
+ have to wait until Apple fixes these security holes, if it decides
to fix it. A free operating system would let people to identify the
hole and fix it.</p>
@@ -134,7 +125,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -206,8 +197,8 @@
activity and digital communications</a>.</p>
<p>What creates the opportunity to try this is the fact that these
- companies are already snooping on users' private
activities.</em></ins></span> That
- in <span class="removed"><del><strong>itself</strong></del></span> <span
class="inserted"><ins><em>turn is due to people's use of nonfree software which
snoops,
+ companies are already snooping on users' private activities. That
+ in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
@@ -216,7 +207,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A zero-day vulnerability in Zoom which <a
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
- be used to launch remote code execution (RCE) attacks</a> has been
+ be used to launch remote code execution (RCE)
attacks</a></em></ins></span> has <span
class="removed"><del><strong>bugs,</strong></del></span> <span
class="inserted"><ins><em>been
disclosed by researchers. The researchers demonstrated a three-bug
attack chain that caused an RCE on a target machine, all this without
any form of user interaction.</p>
@@ -228,13 +219,13 @@
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
company's proprietary software are cracked</a> by a major security
breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
+ gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
Verkada's cameras.</p>
<p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
to the public</a> for gyms, stores, hospitals, jails, and schools to
hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
+ collect it at</em></ins></span> any <span
class="removed"><del><strong>system, free</strong></del></span> <span
class="inserted"><ins><em>time, without even telling them.</p>
<p><small>Please note that the article
wrongly refers to crackers as “<a
@@ -250,7 +241,7 @@
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
in Microsoft's proprietary email software, named Microsoft 365</a>.
It
is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
+ program</em></ins></span> or <span
class="removed"><del><strong>proprietary, may</strong></del></span> <span
class="inserted"><ins><em>not but history and experience tells us it wouldn't be
the last disaster with proprietary programs.</p>
</li>
@@ -261,7 +252,7 @@
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
flaw in proprietary program Microsoft Windows Defender that lurked
undetected for 12 years</a>. If the program was free (as in freedom),
- more people would have had a chance to notice the problem, therefore,
+ more people would</em></ins></span> have <span
class="inserted"><ins><em>had a chance to notice the problem, therefore,
it could've been fixed a lot sooner.</p>
</li>
@@ -340,7 +331,7 @@
and reports users' computing to Apple.</p>
<p>The reports are even unencrypted and they've been leaking this
- data for two years already. This malware</em></ins></span> is <span
class="inserted"><ins><em>reporting to Apple what
+ data for two years already. This malware is reporting to Apple what
user opens what program at what time. It also gives Apple
power to sabotage users' computing.</p>
</li>
@@ -368,10 +359,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
+ A disasterous</em></ins></span> security
+<span class="removed"><del><strong>holes. That</strong></del></span> <span
class="inserted"><ins><em>bug</a> touches millions of
products</em></ins></span> in <span
class="removed"><del><strong>itself</strong></del></span> <span
class="inserted"><ins><em>the
Internet of Stings.</p>
- <p>As a result, anyone can sting the user,</em></ins></span> not
<span class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>only the
+ <p>As a result, anyone can sting the user, not only the
manufacturer.</p>
</li>
@@ -390,7 +382,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Riot Games' new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It is insecure
software
+ on system boot at kernel level</a> on Windows. It</em></ins></span>
is <span class="inserted"><ins><em>insecure software
that increases the attack surface of the operating system.</p>
</li>
@@ -413,7 +405,7 @@
access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
+ <p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
out any significant surveillance if the devices implemented proper
security, including encryption.</em></ins></span> But <span
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
software
@@ -455,7 +447,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when the user says <a
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
@@ -472,7 +464,7 @@
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats as well.</p>
+ inexcusable</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>if it didn't lead to security threats as
well.</p>
</li>
<li id="M201903210">
@@ -532,7 +524,8 @@
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
+ <p>It was very difficult for</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to do this. The job would be much
easier for Amazon. And if some government such as China or the US
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
@@ -582,7 +575,7 @@
<li id="M201711200">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon recently invited consumers to be suckers and <a
+ <p>Amazon recently invited consumers to be suckers</em></ins></span>
and <span class="removed"><del><strong><em>the</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
@@ -632,8 +625,7 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
+ find those accounts and use them to get into users'
cameras</a>.</p>
</li>
<li id="M201706050">
@@ -647,7 +639,7 @@
<p>The vulnerability allowed a cracker to access
the computer's Intel Active Management Technology (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface with an empty password</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>gave administrative
+ web interface with an empty password and gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
other privileges.</p>
@@ -1224,10 +1216,12 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1240,12 +1234,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
+ of WhatsApp</a> makes eavesdropping a snap.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312290">
+ <li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1430,7 +1422,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary-insecurity.ja.po 31 Jul 2021 07:32:18 -0000 1.173
+++ proprietary-insecurity.ja.po 31 Jul 2021 17:03:12 -0000 1.174
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -106,20 +106,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -133,14 +127,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -156,10 +142,10 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -181,8 +167,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-insecurity.pot 31 Jul 2021 07:32:18 -0000 1.139
+++ proprietary-insecurity.pot 31 Jul 2021 17:03:12 -0000 1.140
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,20 +74,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs "
-"too</em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program "
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program "
"and/or fix the bugs they find, often in communities as they are able to "
"share the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -101,14 +95,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -122,10 +108,9 @@
msgid ""
"<a "
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -147,8 +132,7 @@
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-insecurity.pt-br.po 31 Jul 2021 07:32:18 -0000 1.10
+++ proprietary-insecurity.pt-br.po 31 Jul 2021 17:03:12 -0000 1.11
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -78,12 +78,19 @@
msgstr "Isso geralmente assume a forma de funcionalidades maliciosas."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Esta página lista casos claramente estabelecidos de insegurança em software
"
"privativo que têm consequências graves ou são dignos de nota. Embora a "
@@ -94,15 +101,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -116,24 +117,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todos os programas complexos, sejam livres ou privativos, contêm bugs. O que
"
-"torna os bugs mais perigosos em software privativo é que os usuários são "
-"<em>incapazes de corrigir quaisquer problemas de segurança que surjam</em>. "
-"Manter os usuários desamparados é o que é culpado no software privativo."
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -147,12 +130,19 @@
"ou duas referências confiáveis para servir como comprovação especÃfica."
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -196,8 +186,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
@@ -1826,3 +1815,21 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todos os programas complexos, sejam livres ou privativos, contêm bugs. O "
+#~ "que torna os bugs mais perigosos em software privativo é que os usuários
"
+#~ "são <em>incapazes de corrigir quaisquer problemas de segurança que "
+#~ "surjam</em>. Manter os usuários desamparados é o que é culpado no "
+#~ "software privativo."
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary-insecurity.ru.po 31 Jul 2021 08:31:02 -0000 1.312
+++ proprietary-insecurity.ru.po 31 Jul 2021 17:03:12 -0000 1.313
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -80,12 +81,25 @@
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑлÑÑÑÑÑ ÑÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи "
"неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе имели
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ пÑимеÑаÑелÑÐ½Ñ Ð¿Ð¾ "
@@ -95,20 +109,24 @@
"оÑибки, и ÑаÑÑо веÑÑма гÑÑбÑе."
#. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-"СмÑÑл ÑÑой ÑÑÑаниÑÑ Ð½Ðµ в Ñом, ÑÑо
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ подвеÑÐ¶ÐµÐ½Ñ Ð¾Ñибкам "
-"или недоÑеÑам в заÑиÑе; ÑÑÑаниÑа
показÑваеÑ, ÑÑо <em>в неÑвободнÑÑ
"
-"пÑогÑаммаÑ
Ñоже еÑÑÑ Ð¾Ñибки</em>, и они не
Ñак заÑиÑенÑ, как могÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ "
-"попÑлÑÑнÑе ÑÑедÑÑва маÑÑовой инÑоÑмаÑии."
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+# | [-Handling insecurities in-]{+This doesn't imply that+} free software is
+# | [-different from doing so in-] {+immune to bugs or insecurities. The
+# | difference between free and+} proprietary [-programs. Free-] {+software in
+# | this respect is the handling of the bugs: free+} software users are able
+# | to study the program and/or fix the bugs they find, often in communities
+# | as they are able to share the program, while proprietary program users are
+# | forced to rely on the program's developer for fixes.
+#, fuzzy
+#| msgid ""
+#| "Handling insecurities in free software is different from doing so in "
+#| "proprietary programs. Free software users are able to study the program "
+#| "and/or fix the bugs they find, often in communities as they are able to "
+#| "share the program, while proprietary program users are forced to rely on "
+#| "the program's developer for fixes."
+msgid ""
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -120,6 +138,13 @@
"пÑогÑÐ°Ð¼Ð¼Ñ Ð²ÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¿Ð¾Ð»Ð°Ð³Ð°ÑÑÑÑ Ð²
иÑпÑавлениÑÑ
на ÑазÑабоÑÑика пÑогÑаммÑ."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If the developer does not care to fix the problem — often the case "
+#| "for embedded software and old releases — the users are sunk. But "
+#| "if the developer does send a corrected version, it may contain new "
+#| "malicious functionalities as well as bug fixes."
msgid ""
"If the developer does not care to fix the problem — often the case for "
"embedded software and old releases — the users are sunk. But if the "
@@ -132,19 +157,6 @@
"иÑпÑавленнÑÑ Ð²ÐµÑÑиÑ, в ней вмеÑÑе Ñ
иÑпÑавлениÑми оÑибок могÑÑ Ð±ÑÑÑ Ð½Ð¾Ð²Ñе "
"вÑедоноÑнÑе ÑÑнкÑии."
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"ÐÑе ÑложнÑе пÑогÑаммÑ, как ÑвободнÑе, Ñак
и неÑвободнÑе, ÑодеÑÐ¶Ð°Ñ Ð¾Ñибки. "
-"Ðолее опаÑнÑми оÑибки в неÑвободнÑÑ
пÑогÑаммаÑ
Ð´ÐµÐ»Ð°ÐµÑ Ñо, ÑÑо полÑзоваÑели "
-"<em>беÑпомоÑÐ½Ñ Ð¿Ñи необÑ
одимоÑÑи иÑпÑавиÑÑ
лÑбÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи, "
-"коÑоÑÑе возникаÑÑ</em>. Ðменно Ñо, ÑÑо
полÑзоваÑелей оÑÑавлÑÑÑ Ð±ÐµÑпомоÑнÑми, "
-"доÑÑойно поÑиÑÐ°Ð½Ð¸Ñ Ð² неÑвободнÑÑ
пÑогÑаммаÑ
."
-
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
@@ -158,12 +170,25 @@
"каÑеÑÑве конкÑеÑнÑÑ
ÑвидеÑелÑÑÑв."
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
@@ -193,13 +218,26 @@
"взломÑиков.</small>"
#. type: Content of: <div><div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
@@ -1828,6 +1866,28 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid ""
+#~ "The point of this page is not to imply that free software is immune to "
+#~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "
+#~ "too</em>, and is not secure as mainstream media may say."
+#~ msgstr ""
+#~ "СмÑÑл ÑÑой ÑÑÑаниÑÑ Ð½Ðµ в Ñом, ÑÑо
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ подвеÑÐ¶ÐµÐ½Ñ "
+#~ "оÑибкам или недоÑеÑам в заÑиÑе; ÑÑÑаниÑа
показÑваеÑ, ÑÑо <em>в "
+#~ "неÑвободнÑÑ
пÑогÑаммаÑ
Ñоже еÑÑÑ
оÑибки</em>, и они не Ñак заÑиÑенÑ, как "
+#~ "могÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ Ð¿Ð¾Ð¿ÑлÑÑнÑе ÑÑедÑÑва
маÑÑовой инÑоÑмаÑии."
+
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "ÐÑе ÑложнÑе пÑогÑаммÑ, как ÑвободнÑе,
Ñак и неÑвободнÑе, ÑодеÑÐ¶Ð°Ñ Ð¾Ñибки. "
+#~ "Ðолее опаÑнÑми оÑибки в неÑвободнÑÑ
пÑогÑаммаÑ
Ð´ÐµÐ»Ð°ÐµÑ Ñо, ÑÑо "
+#~ "полÑзоваÑели <em>беÑпомоÑÐ½Ñ Ð¿Ñи необÑ
одимоÑÑи иÑпÑавиÑÑ Ð»ÑбÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ "
+#~ "безопаÑноÑÑи, коÑоÑÑе возникаÑÑ</em>.
Ðменно Ñо, ÑÑо полÑзоваÑелей "
+#~ "оÑÑавлÑÑÑ Ð±ÐµÑпомоÑнÑми, доÑÑойно
поÑиÑÐ°Ð½Ð¸Ñ Ð² неÑвободнÑÑ
пÑогÑаммаÑ
."
+
#, fuzzy
#~| msgid ""
#~| "<small>(Please note that the article wrongly refers to crackers as \"<a "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.de-diff.html 31 Jul 2021 07:32:18 -0000 1.289
+++ proprietary.de-diff.html 31 Jul 2021 17:03:12 -0000 1.290
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;</em></ins></span>
+ text-decoration: none;
}
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -229,7 +229,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -252,7 +252,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -379,7 +379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary.de.po 31 Jul 2021 07:32:18 -0000 1.306
+++ proprietary.de.po 31 Jul 2021 17:03:12 -0000 1.307
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -481,10 +481,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -518,8 +518,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.493
retrieving revision 1.494
diff -u -b -r1.493 -r1.494
--- proprietary.es.po 31 Jul 2021 07:32:18 -0000 1.493
+++ proprietary.es.po 31 Jul 2021 17:03:12 -0000 1.494
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -343,10 +343,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -371,8 +371,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.520
retrieving revision 1.521
diff -u -b -r1.520 -r1.521
--- proprietary.fr.po 31 Jul 2021 07:32:18 -0000 1.520
+++ proprietary.fr.po 31 Jul 2021 17:03:12 -0000 1.521
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-30 18:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -338,12 +338,25 @@
msgstr "Ajouts récents"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">Des crackers ont exploité une faille <i>zero-"
@@ -376,8 +389,8 @@
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
# | people's calls, copy their messages, and secretly film them, using a
-# | zero-click (means no interaction is needed) [-and zero-day (means the bug
-# | was not found yet) vulnerabilities.-] {+vulnerability.+}
+# | [-zero-click (means no interaction is needed) and zero-day (means the bug
+# | was not found yet) vulnerabilities.-] {+security vulnerability.+}
#, fuzzy
#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
@@ -392,8 +405,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\">Le logiciel espion Pegasus utilise des "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary.it-diff.html 31 Jul 2021 07:32:18 -0000 1.299
+++ proprietary.it-diff.html 31 Jul 2021 17:03:12 -0000 1.300
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;</em></ins></span>
+ text-decoration: none;
}
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -228,7 +228,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -251,7 +251,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -378,7 +378,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary.it.po 31 Jul 2021 07:32:18 -0000 1.315
+++ proprietary.it.po 31 Jul 2021 17:03:12 -0000 1.316
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -486,10 +486,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -511,8 +511,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary.ja-diff.html 31 Jul 2021 07:32:18 -0000 1.304
+++ proprietary.ja-diff.html 31 Jul 2021 17:03:12 -0000 1.305
@@ -233,7 +233,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -256,7 +256,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -383,7 +383,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:18 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary.ja.po 31 Jul 2021 07:32:18 -0000 1.298
+++ proprietary.ja.po 31 Jul 2021 17:03:12 -0000 1.299
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -344,10 +344,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -369,8 +369,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary.nl-diff.html 31 Jul 2021 07:32:19 -0000 1.300
+++ proprietary.nl-diff.html 31 Jul 2021 17:03:12 -0000 1.301
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;</em></ins></span>
+ text-decoration: none;
}
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -228,7 +228,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -251,7 +251,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -378,7 +378,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.nl.po 31 Jul 2021 07:32:19 -0000 1.289
+++ proprietary.nl.po 31 Jul 2021 17:03:12 -0000 1.290
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -389,10 +389,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -414,8 +414,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- proprietary.pl-diff.html 31 Jul 2021 07:32:19 -0000 1.316
+++ proprietary.pl-diff.html 31 Jul 2021 17:03:12 -0000 1.317
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -227,7 +227,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -250,7 +250,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -377,7 +377,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- proprietary.pl.po 31 Jul 2021 07:32:19 -0000 1.281
+++ proprietary.pl.po 31 Jul 2021 17:03:12 -0000 1.282
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -570,10 +570,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -595,8 +595,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.pot 31 Jul 2021 07:32:19 -0000 1.278
+++ proprietary.pot 31 Jul 2021 17:03:12 -0000 1.279
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -282,10 +282,9 @@
msgid ""
"<a "
"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used a zero-day and zero-click exploit in Apple iThings to install "
-"spyware</a> on people's devices, many of them to be journalists, even if "
-"they were using the latest version of the proprietary operating system "
-"installed on their iDevice."
+"used an exploit in Apple iThings to install spyware</a> on people's devices, "
+"many of them to be journalists, even if they were using the latest version "
+"of the proprietary operating system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -307,8 +306,7 @@
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
-"copy their messages, and secretly film them, using a zero-click (means no "
-"interaction is needed) vulnerability."
+"copy their messages, and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.443
retrieving revision 1.444
diff -u -b -r1.443 -r1.444
--- proprietary.pt-br.po 31 Jul 2021 07:32:19 -0000 1.443
+++ proprietary.pt-br.po 31 Jul 2021 17:03:12 -0000 1.444
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -335,12 +335,19 @@
msgstr "Ãltimas adições"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -384,8 +391,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.539
retrieving revision 1.540
diff -u -b -r1.539 -r1.540
--- proprietary.ru.po 31 Jul 2021 08:31:02 -0000 1.539
+++ proprietary.ru.po 31 Jul 2021 17:03:12 -0000 1.540
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -339,12 +340,25 @@
msgstr "ÐоÑледние добавлениÑ"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
@@ -374,13 +388,26 @@
"взломÑиков.</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.tr.po 31 Jul 2021 12:42:17 -0000 1.188
+++ proprietary.tr.po 31 Jul 2021 17:03:12 -0000 1.189
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-31 14:40+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-31 16:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -335,12 +336,19 @@
msgstr "Son eklenenler"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"Kırıcılar, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
kurulu bile "
"olsa, çoÄu gazeteci olan insanların aygıtlarına <a
href=\"https://www.xda-"
@@ -369,13 +377,20 @@
"adlandırmaktır.</small>"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"Pegasus casus yazılımı, insanları gözetim altına almak için <a href="
"\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-"
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.zh-cn.po 31 Jul 2021 07:32:19 -0000 1.236
+++ proprietary.zh-cn.po 31 Jul 2021 17:03:12 -0000 1.237
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2021-07-16 16:36+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -317,10 +317,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -344,8 +344,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary.zh-tw-diff.html 31 Jul 2021 07:32:19 -0000 1.279
+++ proprietary.zh-tw-diff.html 31 Jul 2021 17:03:12 -0000 1.280
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;</em></ins></span>
+ text-decoration: none;
}
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -229,7 +229,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -252,7 +252,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -379,7 +379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 07:32:19 $
+$Date: 2021/07/31 17:03:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary.zh-tw.po 31 Jul 2021 07:32:19 -0000 1.268
+++ proprietary.zh-tw.po 31 Jul 2021 17:03:12 -0000 1.269
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-31 07:25+0000\n"
+"POT-Creation-Date: 2021-07-31 16:56+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -459,10 +459,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -484,8 +484,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.414
retrieving revision 1.415
diff -u -b -r1.414 -r1.415
--- pt-br.po 31 Jul 2021 07:32:19 -0000 1.414
+++ pt-br.po 31 Jul 2021 17:03:12 -0000 1.415
@@ -507,12 +507,19 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
@@ -556,8 +563,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
@@ -12185,12 +12191,19 @@
msgstr "Insegurança privativa"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Esta página lista casos claramente estabelecidos de insegurança em software
"
"privativo que têm consequências graves ou são dignos de nota. Embora a "
@@ -12201,15 +12214,9 @@
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -12223,24 +12230,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-#, fuzzy
-#| msgid ""
-#| "All complex programs, whether free or proprietary, contain bugs. What "
-#| "makes bugs more dangerous in proprietary software is that users are "
-#| "<em>helpless to fix any security problems that arise</em>. Keeping the "
-#| "users helpless is what's culpable about proprietary software."
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"Todos os programas complexos, sejam livres ou privativos, contêm bugs. O que
"
-"torna os bugs mais perigosos em software privativo é que os usuários são "
-"<em>incapazes de corrigir quaisquer problemas de segurança que surjam</em>. "
-"Manter os usuários desamparados é o que é culpado no software privativo."
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
@@ -13352,6 +13341,77 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> O <em>spyware</em> pegasus usou "
+#~ "vulnerabilidades em sistemas operacionais proprietários de smartphones </"
+#~ "a> para impor vigilância às pessoas. Ele pode gravar ligações das "
+#~ "pessoas, copiar suas mensagens e filmá-las secretamente, usando "
+#~ "vulnerabilidades de zero-click (significa que nenhuma interação é "
+#~ "necessária) e zero-day (significa que o bug ainda não foi encontrado)."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Esta página lista casos claramente estabelecidos de insegurança em "
+#~ "software privativo que têm consequências graves ou são dignos de nota. "
+#~ "Embora a maioria dessas falhas de segurança não sejam intencionais, "
+#~ "portanto, não são funcionalidades mal-intencionadas em sentido estrito, "
+#~ "nós as relatamos para mostrar que o software privativo não é imune a
bugs "
+#~ "e costuma ser bastante desleixado."
+
+#, fuzzy
+#~| msgid ""
+#~| "All complex programs, whether free or proprietary, contain bugs. What "
+#~| "makes bugs more dangerous in proprietary software is that users are "
+#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~| "users helpless is what's culpable about proprietary software."
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "Todos os programas complexos, sejam livres ou privativos, contêm bugs. O "
+#~ "que torna os bugs mais perigosos em software privativo é que os usuários
"
+#~ "são <em>incapazes de corrigir quaisquer problemas de segurança que "
+#~ "surjam</em>. Manter os usuários desamparados é o que é culpado no "
+#~ "software privativo."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.696
retrieving revision 1.697
diff -u -b -r1.696 -r1.697
--- ru.po 31 Jul 2021 09:00:58 -0000 1.696
+++ ru.po 31 Jul 2021 17:03:12 -0000 1.697
@@ -508,12 +508,25 @@
msgstr "</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
+# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
+# | install spyware</a> on people's devices, many of them to be journalists,
+# | even if they were using the latest version of the proprietary operating
+# | system installed on their iDevice.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
@@ -543,13 +556,26 @@
"взломÑиков.</small>"
#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
+# | The pegasus spyware used vulnerabilities on proprietary smartphone
+# | operating systems</a> to impose surveillance on people. It can record
+# | people's calls, copy their messages, and secretly film them, using a
+# | [-zero-click (means no interaction is needed)-] {+security+} vulnerability.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#| "surveillance on people. It can record people's calls, copy their "
+#| "messages, and secretly film them, using a zero-click (means no "
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион Pegasus
пÑименÑла "
@@ -12327,12 +12353,25 @@
msgstr "УÑзвимоÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм"
#. type: Content of: <div><div><p>
+# | This page lists clearly established cases of insecurity in proprietary
+# | software that has grave consequences or is otherwise noteworthy. Even
+# | though most of these security flaws are unintentional, thus are not
+# | malicious functionalities in a strict sense, we report them to show that
+# | proprietary software is not [-immune to bugs, and is often quite sloppy.-]
+# | {+as secure as mainstream media may say.+}
+#, fuzzy
+#| msgid ""
+#| "This page lists clearly established cases of insecurity in proprietary "
+#| "software that has grave consequences or is otherwise noteworthy. Even "
+#| "though most of these security flaws are unintentional, thus are not "
+#| "malicious functionalities in a strict sense, we report them to show that "
+#| "proprietary software is not immune to bugs, and is often quite sloppy."
msgid ""
"This page lists clearly established cases of insecurity in proprietary "
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
"Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑлÑÑÑÑÑ ÑÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи "
"неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе имели
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ пÑимеÑаÑелÑÐ½Ñ Ð¿Ð¾ "
@@ -12342,20 +12381,24 @@
"оÑибки, и ÑаÑÑо веÑÑма гÑÑбÑе."
#. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-"СмÑÑл ÑÑой ÑÑÑаниÑÑ Ð½Ðµ в Ñом, ÑÑо
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ подвеÑÐ¶ÐµÐ½Ñ Ð¾Ñибкам "
-"или недоÑеÑам в заÑиÑе; ÑÑÑаниÑа
показÑваеÑ, ÑÑо <em>в неÑвободнÑÑ
"
-"пÑогÑаммаÑ
Ñоже еÑÑÑ Ð¾Ñибки</em>, и они не
Ñак заÑиÑенÑ, как могÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ "
-"попÑлÑÑнÑе ÑÑедÑÑва маÑÑовой инÑоÑмаÑии."
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+# | [-Handling insecurities in-]{+This doesn't imply that+} free software is
+# | [-different from doing so in-] {+immune to bugs or insecurities. The
+# | difference between free and+} proprietary [-programs. Free-] {+software in
+# | this respect is the handling of the bugs: free+} software users are able
+# | to study the program and/or fix the bugs they find, often in communities
+# | as they are able to share the program, while proprietary program users are
+# | forced to rely on the program's developer for fixes.
+#, fuzzy
+#| msgid ""
+#| "Handling insecurities in free software is different from doing so in "
+#| "proprietary programs. Free software users are able to study the program "
+#| "and/or fix the bugs they find, often in communities as they are able to "
+#| "share the program, while proprietary program users are forced to rely on "
+#| "the program's developer for fixes."
+msgid ""
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -12367,6 +12410,13 @@
"пÑогÑÐ°Ð¼Ð¼Ñ Ð²ÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¿Ð¾Ð»Ð°Ð³Ð°ÑÑÑÑ Ð²
иÑпÑавлениÑÑ
на ÑазÑабоÑÑика пÑогÑаммÑ."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If the developer does not care to fix the problem — often the case "
+#| "for embedded software and old releases — the users are sunk. But "
+#| "if the developer does send a corrected version, it may contain new "
+#| "malicious functionalities as well as bug fixes."
msgid ""
"If the developer does not care to fix the problem — often the case for "
"embedded software and old releases — the users are sunk. But if the "
@@ -12379,19 +12429,6 @@
"иÑпÑавленнÑÑ Ð²ÐµÑÑиÑ, в ней вмеÑÑе Ñ
иÑпÑавлениÑми оÑибок могÑÑ Ð±ÑÑÑ Ð½Ð¾Ð²Ñе "
"вÑедоноÑнÑе ÑÑнкÑии."
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-"ÐÑе ÑложнÑе пÑогÑаммÑ, как ÑвободнÑе, Ñак
и неÑвободнÑе, ÑодеÑÐ¶Ð°Ñ Ð¾Ñибки. "
-"Ðолее опаÑнÑми оÑибки в неÑвободнÑÑ
пÑогÑаммаÑ
Ð´ÐµÐ»Ð°ÐµÑ Ñо, ÑÑо полÑзоваÑели "
-"<em>беÑпомоÑÐ½Ñ Ð¿Ñи необÑ
одимоÑÑи иÑпÑавиÑÑ
лÑбÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи, "
-"коÑоÑÑе возникаÑÑ</em>. Ðменно Ñо, ÑÑо
полÑзоваÑелей оÑÑавлÑÑÑ Ð±ÐµÑпомоÑнÑми, "
-"доÑÑойно поÑиÑÐ°Ð½Ð¸Ñ Ð² неÑвободнÑÑ
пÑогÑаммаÑ
."
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
@@ -13516,6 +13553,97 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> ÐÑогÑамма-Ñпион
Pegasus пÑименÑла "
+#~ "ÑÑзвимоÑÑи в неÑвободÑÑÑ
опеÑаÑионнÑÑ
ÑиÑÑемаÑ
ÑмаÑÑÑонов</a>, ÑÑÐ¾Ð±Ñ "
+#~ "навÑзÑваÑÑ Ð»ÑдÑм ÑлежкÑ. Ðна можеÑ
запиÑÑваÑÑ Ð¿ÐµÑеговоÑÑ Ð»Ñдей, "
+#~ "копиÑоваÑÑ Ð¸Ñ
ÑообÑениÑ, а Ñакже Ñайно
делаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
+#~ "безÑелÑковой (Ñ.е. взаимодейÑÑвие Ñ
полÑзоваÑелем не ÑÑебÑеÑÑÑ) "
+#~ "ÑÑзвимоÑÑи."
+
+#~ msgid ""
+#~ "This page lists clearly established cases of insecurity in proprietary "
+#~ "software that has grave consequences or is otherwise noteworthy. Even "
+#~ "though most of these security flaws are unintentional, thus are not "
+#~ "malicious functionalities in a strict sense, we report them to show that "
+#~ "proprietary software is not immune to bugs, and is often quite sloppy."
+#~ msgstr ""
+#~ "Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑлÑÑÑÑÑ ÑÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи "
+#~ "неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе имели
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ пÑимеÑаÑелÑÐ½Ñ "
+#~ "по дÑÑгим пÑиÑинам. ХоÑÑ Ð±Ð¾Ð»ÑÑинÑÑво из
ÑÑиÑ
пÑоÑеÑ
безопаÑноÑÑи "
+#~ "непÑеднамеÑÐµÐ½Ð½Ñ Ð¸ Ñаким обÑазом не
ÑвлÑÑÑÑÑ Ð²ÑедоноÑнÑми в Ñзком ÑмÑÑле, "
+#~ "Ð¼Ñ ÑообÑаем о ниÑ
, ÑÑÐ¾Ð±Ñ Ð¿Ð¾ÐºÐ°Ð·Ð°ÑÑ, ÑÑо
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ иÑклÑÑаÑÑ "
+#~ "оÑибки, и ÑаÑÑо веÑÑма гÑÑбÑе."
+
+#~ msgid ""
+#~ "The point of this page is not to imply that free software is immune to "
+#~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "
+#~ "too</em>, and is not secure as mainstream media may say."
+#~ msgstr ""
+#~ "СмÑÑл ÑÑой ÑÑÑаниÑÑ Ð½Ðµ в Ñом, ÑÑо
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ подвеÑÐ¶ÐµÐ½Ñ "
+#~ "оÑибкам или недоÑеÑам в заÑиÑе; ÑÑÑаниÑа
показÑваеÑ, ÑÑо <em>в "
+#~ "неÑвободнÑÑ
пÑогÑаммаÑ
Ñоже еÑÑÑ
оÑибки</em>, и они не Ñак заÑиÑенÑ, как "
+#~ "могÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ Ð¿Ð¾Ð¿ÑлÑÑнÑе ÑÑедÑÑва
маÑÑовой инÑоÑмаÑии."
+
+#~ msgid ""
+#~ "Handling insecurities in free software is different from doing so in "
+#~ "proprietary programs. Free software users are able to study the program "
+#~ "and/or fix the bugs they find, often in communities as they are able to "
+#~ "share the program, while proprietary program users are forced to rely on "
+#~ "the program's developer for fixes."
+#~ msgstr ""
+#~ "ÐÑибки в заÑиÑе ÑвободнÑÑ
пÑогÑамм
ÑÑÑÑанÑÑÑÑÑ Ð½Ðµ Ñак, как в неÑвободнÑÑ
"
+#~ "пÑогÑаммаÑ
. ÐолÑзоваÑели ÑвободнÑÑ
пÑогÑамм могÑÑ Ð¸Ð·ÑÑаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸ "
+#~ "ÑÑÑÑанÑÑÑ Ð¾Ñибки, коÑоÑÑе они найдÑÑ,
ÑаÑÑо в ÑообÑеÑÑваÑ
, поÑколÑÐºÑ Ð¾Ð½Ð¸ "
+#~ "могÑÑ Ð¾Ð±Ð¼ÐµÐ½Ð¸Ð²Ð°ÑÑÑÑ Ð¿ÑогÑаммой, в Ñо
вÑÐµÐ¼Ñ ÐºÐ°Ðº полÑзоваÑели неÑвободной "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð²ÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¿Ð¾Ð»Ð°Ð³Ð°ÑÑÑÑ Ð²
иÑпÑавлениÑÑ
на ÑазÑабоÑÑика пÑогÑаммÑ."
+
+#~ msgid ""
+#~ "If the developer does not care to fix the problem — often the case "
+#~ "for embedded software and old releases — the users are sunk. But "
+#~ "if the developer does send a corrected version, it may contain new "
+#~ "malicious functionalities as well as bug fixes."
+#~ msgstr ""
+#~ "ÐÑли ÑазÑабоÑÑик не позабоÑиÑÑÑ Ð¾Ð±
ÑÑÑÑанении пÑÐ¾Ð±Ð»ÐµÐ¼Ñ — а "
+#~ "ÑаÑÑо Ñак и бÑÐ²Ð°ÐµÑ Ð² ÑлÑÑае вÑÑÑоеннÑÑ
ÑиÑÑем и ÑÑаÑÑÑ
вÑпÑÑков "
+#~ "— полÑзоваÑели ниÑего не могÑÑ
поделаÑÑ. Ðо еÑли ÑазÑабоÑÑик и "
+#~ "пÑедоÑÑавлÑÐµÑ Ð¸ÑпÑавленнÑÑ Ð²ÐµÑÑиÑ, в
ней вмеÑÑе Ñ Ð¸ÑпÑавлениÑми оÑибок "
+#~ "могÑÑ Ð±ÑÑÑ Ð½Ð¾Ð²Ñе вÑедоноÑнÑе ÑÑнкÑии."
+
+#~ msgid ""
+#~ "All complex programs, whether free or proprietary, contain bugs. What "
+#~ "makes bugs more dangerous in proprietary software is that users are "
+#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
+#~ "users helpless is what's culpable about proprietary software."
+#~ msgstr ""
+#~ "ÐÑе ÑложнÑе пÑогÑаммÑ, как ÑвободнÑе,
Ñак и неÑвободнÑе, ÑодеÑÐ¶Ð°Ñ Ð¾Ñибки. "
+#~ "Ðолее опаÑнÑми оÑибки в неÑвободнÑÑ
пÑогÑаммаÑ
Ð´ÐµÐ»Ð°ÐµÑ Ñо, ÑÑо "
+#~ "полÑзоваÑели <em>беÑпомоÑÐ½Ñ Ð¿Ñи необÑ
одимоÑÑи иÑпÑавиÑÑ Ð»ÑбÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ "
+#~ "безопаÑноÑÑи, коÑоÑÑе возникаÑÑ</em>.
Ðменно Ñо, ÑÑо полÑзоваÑелей "
+#~ "оÑÑавлÑÑÑ Ð±ÐµÑпомоÑнÑми, доÑÑойно
поÑиÑÐ°Ð½Ð¸Ñ Ð² неÑвободнÑÑ
пÑогÑаммаÑ
."
+
+#~ msgid ""
#~ "All complex programs, whether free or proprietary, contain bugs. What "
#~ "makes bugs more dangerous in proprietary software is that users are "
#~ "<em>helpless to fix any security problems that arise</em>. Keeping the "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- tr.po 31 Jul 2021 07:32:19 -0000 1.209
+++ tr.po 31 Jul 2021 17:03:13 -0000 1.210
@@ -413,12 +413,19 @@
msgstr ""
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#| "of them to be journalists, even if they were using the latest version of "
+#| "the proprietary operating system installed on their iDevice."
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
"Kırıcılar, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
kurulu bile "
"olsa, çoÄu gazeteci olan insanların aygıtlarına <a
href=\"https://www.xda-"
@@ -458,23 +465,20 @@
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
#| "surveillance on people. It can record people's calls, copy their "
#| "messages, and secretly film them, using a zero-click (means no "
-#| "interaction is needed) and zero-day (means the bug was not found yet) "
-#| "vulnerabilities."
+#| "interaction is needed) vulnerability."
msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
"Pegasus casus yazılımı, insanları gözetim altına almak için <a href="
"\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-"
"how-does-it-hack-phones\">özel mülk akıllı telefon iÅletim
sistemlerindeki "
-"zaafları kullandı</a>. Ä°nsanların çaÄrılarını okuyabiliyor,
iletilerini "
-"kopyayabiliyor, ve gizlice onları filme alabiliyor, bunun için tıklama "
-"gerektirmeyen (yani etkileÅime ihtiyaç duymayan) ve sıfır gün (bu
hatanın "
-"henüz bulunamadıÄı anlamına geliyor) açıklarını kullanıyor."
+"açıkları kullandı</a>. Ä°nsanların çaÄrılarını kaydedebiliyor,
iletilerini "
+"kopyalabiliyor ve gizlice onları filme çekebiliyor, bunun için bir sıfır
"
+"tıklama (yani etkileÅime ihtiyaç duymayan) açıÄı kullanıyor."
#. type: Content of: <div><ul><li><p>
#, fuzzy
@@ -9586,20 +9590,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -9613,14 +9611,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
@@ -10497,6 +10487,45 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~ "exploit in Apple iThings to install spyware</a> on people's devices, many "
+#~ "of them to be journalists, even if they were using the latest version of "
+#~ "the proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Kırıcılar, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
kurulu "
+#~ "bile olsa, çoÄu gazeteci olan insanların aygıtlarına <a
href=\"https://"
+#~ "www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-"
+#~ "journalists/\">casus yazılım kurmak için, Apple iÅeyler'deki bir
sıfır "
+#~ "gün açıÄını kullandılar</a>."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~| "vulnerabilities on proprietary smartphone operating systems</a> to "
+#~| "impose surveillance on people. It can record people's calls, copy their "
+#~| "messages, and secretly film them, using a zero-click (means no "
+#~| "interaction is needed) and zero-day (means the bug was not found yet) "
+#~| "vulnerabilities."
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
+#~ "surveillance on people. It can record people's calls, copy their "
+#~ "messages, and secretly film them, using a zero-click (means no "
+#~ "interaction is needed) vulnerability."
+#~ msgstr ""
+#~ "Pegasus casus yazılımı, insanları gözetim altına almak için <a
href="
+#~ "\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-"
+#~ "and-how-does-it-hack-phones\">özel mülk akıllı telefon iÅletim "
+#~ "sistemlerindeki zaafları kullandı</a>. Ä°nsanların çaÄrılarını "
+#~ "okuyabiliyor, iletilerini kopyayabiliyor, ve gizlice onları filme "
+#~ "alabiliyor, bunun için tıklama gerektirmeyen (yani etkileÅime ihtiyaç "
+#~ "duymayan) ve sıfır gün (bu hatanın henüz bulunamadıÄı anlamına
geliyor) "
+#~ "açıklarını kullanıyor."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#~ "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#~ "vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- zh-cn.po 31 Jul 2021 07:32:19 -0000 1.209
+++ zh-cn.po 31 Jul 2021 17:03:13 -0000 1.210
@@ -415,10 +415,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -446,8 +446,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -9188,20 +9187,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -9215,14 +9208,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- zh-tw.po 31 Jul 2021 07:32:19 -0000 1.332
+++ zh-tw.po 31 Jul 2021 17:03:13 -0000 1.333
@@ -440,10 +440,10 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-"exploit in Apple iThings to install spyware</a> on people's devices, many of "
-"them to be journalists, even if they were using the latest version of the "
-"proprietary operating system installed on their iDevice."
+"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
+"install spyware</a> on people's devices, many of them to be journalists, "
+"even if they were using the latest version of the proprietary operating "
+"system installed on their iDevice."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -465,8 +465,7 @@
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a zero-click (means no interaction is needed) "
-"vulnerability."
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8910,20 +8909,14 @@
"software that has grave consequences or is otherwise noteworthy. Even though "
"most of these security flaws are unintentional, thus are not malicious "
"functionalities in a strict sense, we report them to show that proprietary "
-"software is not immune to bugs, and is often quite sloppy."
+"software is not as secure as mainstream media may say."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"The point of this page is not to imply that free software is immune to bugs "
-"or insecurities; it's to show that <em>proprietary software has bugs too</"
-"em>, and is not secure as mainstream media may say."
-msgstr ""
-
-#. type: Content of: <div><div><p>
-msgid ""
-"Handling insecurities in free software is different from doing so in "
-"proprietary programs. Free software users are able to study the program and/"
+"This doesn't imply that free software is immune to bugs or insecurities. "
+"The difference between free and proprietary software in this respect is the "
+"handling of the bugs: free software users are able to study the program and/"
"or fix the bugs they find, often in communities as they are able to share "
"the program, while proprietary program users are forced to rely on the "
"program's developer for fixes."
@@ -8937,14 +8930,6 @@
"functionalities as well as bug fixes."
msgstr ""
-#. type: Content of: <div><div><p>
-msgid ""
-"All complex programs, whether free or proprietary, contain bugs. What makes "
-"bugs more dangerous in proprietary software is that users are <em>helpless "
-"to fix any security problems that arise</em>. Keeping the users helpless is "
-"what's culpable about proprietary software."
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"One of the dangers of the “internet of stings” is that, if you "
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/04
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/15
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/15
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/25
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/30
- www/proprietary/po all.fr.po all.pot all.pt-br...., GNUN, 2021/07/31
- www/proprietary/po all.fr.po all.pot all.pt-br....,
GNUN <=